doyler / SecurityTools
A single repository for any security tools, scripts, documentation, etc. that I add
☆159Updated 4 years ago
Related projects: ⓘ
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆239Updated 10 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 5 years ago
- ☆81Updated this week
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆139Updated 9 years ago
- DefCon24☆119Updated 8 years ago
- An automated SMB relay exploitation script.☆151Updated 7 years ago
- ☆201Updated this week
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆252Updated 8 years ago
- Automated Responder/secretsdump.py cracking☆181Updated 8 years ago
- ☆138Updated 7 years ago
- ☆92Updated 6 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆89Updated 10 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆155Updated 8 years ago
- Yet another AV evasion tool☆118Updated 2 years ago
- ☆237Updated this week
- Metasploit AV Evasion Tool☆257Updated 8 years ago
- Next Generation Firewall Audit and Bypass Tool☆259Updated 7 years ago
- Exploits and Security Tools Framework 2.0.1☆303Updated 2 years ago
- SpiderLabs shared Nmap Tools☆227Updated 4 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆354Updated last year
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆145Updated 5 years ago
- Fuzzbunch Python-Wine wrapper☆57Updated 7 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆144Updated 8 years ago
- ☆34Updated this week
- A repository for large scripts from my book.☆162Updated 2 years ago
- Public repository for improvements to the EXTRABACON exploit☆158Updated 7 years ago
- A JBoss script for obtaining remote shell access☆170Updated 4 years ago
- ☆123Updated this week
- Automated digital reconnaissance☆189Updated last year
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆205Updated 6 years ago