f11snipe / f11
X-Platform bind shell in TypeScript!
☆28Updated 2 years ago
Alternatives and similar repositories for f11:
Users that are interested in f11 are comparing it to the libraries listed below
- Simple HTTP listener for security testing☆113Updated 4 months ago
- ☆48Updated 10 months ago
- Directory/File, DNS and VHost busting tool written in Go☆20Updated 5 years ago
- Simple C# Port Scanner (Multi-Threaded)☆49Updated 4 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆106Updated 4 months ago
- ☆66Updated 3 years ago
- ☆42Updated last year
- ☆60Updated 3 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆95Updated 2 years ago
- PHP 8.1.0-dev Backdoor System Shell Script☆91Updated 3 years ago
- ☆51Updated 3 weeks ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆63Updated last year
- Collection Of Reverse Shell that can easily generate using Python3☆60Updated last year
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆66Updated last year
- ☆16Updated 3 years ago
- Red Teaming tools and techniques☆51Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated last year
- Abertay CMP202 Project☆34Updated 3 years ago
- this script will help you find favicon hashes which you can use to shodan to get more details about an asset☆28Updated last month
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆51Updated 3 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated 9 months ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆26Updated 6 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆154Updated last week
- ☆24Updated 4 months ago
- ☆68Updated last year
- Statically compiled nmap with scripting☆12Updated 3 years ago
- Offensive Security OSWE Prep 2022☆74Updated 2 years ago
- ☆35Updated 3 years ago
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆54Updated 2 years ago