cis34ux / Tor-Wireless-RouterLinks
☆17Updated 5 years ago
Alternatives and similar repositories for Tor-Wireless-Router
Users that are interested in Tor-Wireless-Router are comparing it to the libraries listed below
Sorting:
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Updated 5 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- Automated script to search in SMB protocol for availables pipe names☆23Updated 7 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 8 years ago
- CTF Writeups☆18Updated 7 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 6 years ago
- Setup Kali XFCE version with some hi-dpi friendly style☆32Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- Automatically spin up infra for phishing☆64Updated 5 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆53Updated last year
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆25Updated 5 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆32Updated last year
- Tool to identify all domains contained in an IP anonymously☆15Updated 8 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- ☆20Updated 5 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Intelligent threat hunter and phishing servers☆48Updated 6 years ago
- Data exfiltration using reflective DNS resolution covert channel☆52Updated 7 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago