foospidy / ipt-kitLinks
Bash scripts to help setup port redirects with iptables
☆16Updated 8 years ago
Alternatives and similar repositories for ipt-kit
Users that are interested in ipt-kit are comparing it to the libraries listed below
Sorting:
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Updated 14 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- Projects and POCs☆61Updated 11 years ago
- A collection of publicly released whitepapers☆49Updated 8 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 11 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 11 years ago
- ☆16Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Terminal Ip Lookup Tool☆56Updated 11 years ago
- Clone of Metasploit's wiki w/ additions☆17Updated 10 years ago
- Scan web server for known webshell names and responses☆50Updated 9 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Updated 10 years ago
- ssh session type for metasploit☆101Updated 2 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- Next Generation of White Chapel☆21Updated 11 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Updated last year
- IRC bot for cracking hashes☆18Updated 4 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Updated 8 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 8 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Data exfiltration PoC scripts☆25Updated 10 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago