☆29Apr 20, 2018Updated 7 years ago
Alternatives and similar repositories for generateJenkinsExploit
Users that are interested in generateJenkinsExploit are comparing it to the libraries listed below
Sorting:
- ☆42Apr 20, 2018Updated 7 years ago
- Custom THP Dropper☆26Mar 27, 2018Updated 7 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- Collection of nmap nse scripts☆23May 15, 2019Updated 6 years ago
- Basic c-keylogger☆26Mar 11, 2018Updated 8 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Apr 14, 2017Updated 8 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆445Nov 30, 2023Updated 2 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17May 16, 2018Updated 7 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago
- The documents☆56Nov 2, 2017Updated 8 years ago
- Parses Nmap XML files☆25Apr 29, 2015Updated 10 years ago
- Docker container for DVWA☆13Jan 5, 2022Updated 4 years ago
- pen testing scripts☆12Feb 7, 2021Updated 5 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- Script for tracking file system changes☆19Jan 23, 2018Updated 8 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 6 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Apr 5, 2018Updated 7 years ago
- ☆523Aug 11, 2023Updated 2 years ago
- it-security related scripts and tools☆25Jun 7, 2019Updated 6 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- Socks5 server over Websockets☆40Oct 17, 2018Updated 7 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆19Apr 20, 2016Updated 9 years ago
- ☆11Oct 23, 2019Updated 6 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Sep 24, 2012Updated 13 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- SSLScrape | A scanning tool for scaping hostnames from SSL certificates.☆338Apr 29, 2021Updated 4 years ago
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- ☆61Mar 16, 2018Updated 8 years ago
- Collection of tools for privesc on Linux☆34Aug 28, 2013Updated 12 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Dec 7, 2018Updated 7 years ago
- Fileless web browser information extraction☆221Apr 23, 2018Updated 7 years ago
- Random stuff☆16Jun 28, 2018Updated 7 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- Bring daemons to life or destroy them forever. Cross platform, Node.js.☆16Jun 27, 2023Updated 2 years ago
- Automatic multiprocess Linux CLI tool that aims for a quick enumeration wrapping pentesting tools.☆13Mar 13, 2026Updated last week