fabrimagic72 / twitint
Twitter Bot to perform advanced search and automated response
☆13Updated 7 years ago
Alternatives and similar repositories for twitint:
Users that are interested in twitint are comparing it to the libraries listed below
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆24Updated 4 months ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Specify targets and run sets of tools against them☆11Updated 9 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Gmail Knocker☆21Updated 7 years ago
- Data exfiltration PoC scripts☆24Updated 9 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆79Updated 7 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆61Updated 7 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Powershell Persistence Locator☆66Updated 8 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆11Updated 7 years ago
- Random stuff☆16Updated 6 years ago
- InfoPath Phishing Repo Resource☆69Updated 7 years ago
- Self contained htaccess shells and attacks☆14Updated 6 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago