g0tmi1k / egressbusterView external linksLinks
Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.
☆12Mar 14, 2018Updated 7 years ago
Alternatives and similar repositories for egressbuster
Users that are interested in egressbuster are comparing it to the libraries listed below
Sorting:
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆12Apr 22, 2018Updated 7 years ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆22Jul 13, 2020Updated 5 years ago
- Directory/file & DNS busting tool written in Go☆14Nov 26, 2019Updated 6 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- This is my path to OSCP☆11Jun 16, 2018Updated 7 years ago
- Installer preseed configurations for Kali Linux☆15Oct 20, 2021Updated 4 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration…☆17May 11, 2025Updated 9 months ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Oct 7, 2013Updated 12 years ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 10 years ago
- A Dockerized build pipeline for custom Windows x64 shellcode☆53Dec 12, 2025Updated 2 months ago
- A CLI tool for managing DigitalOcean droplets with automated setup, SSH configuration, and lifecycle management.☆61Updated this week
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Jan 3, 2020Updated 6 years ago
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- Ansible playbook for Kali☆31Aug 11, 2024Updated last year
- Presentation Slides☆26Jun 7, 2019Updated 6 years ago
- Talk given at DerbyCon and RuxCon 2016☆23Sep 23, 2016Updated 9 years ago
- Red Team AI prompts☆48Dec 2, 2025Updated 2 months ago
- WinRAR 0day CVE-2025-8088 PoC RAR Archive☆45Aug 12, 2025Updated 6 months ago
- Collection of Tools & Techniques for analyzing URLs☆33Oct 1, 2023Updated 2 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- Automate your Kali Linux Penetration Testing toolchain☆31May 24, 2015Updated 10 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- Clean public password dump files and store in ELK☆37Jan 24, 2018Updated 8 years ago
- ☆11Aug 31, 2019Updated 6 years ago
- ☆14Dec 11, 2025Updated 2 months ago
- CVE-2016-2776☆27Oct 3, 2016Updated 9 years ago
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Dec 8, 2022Updated 3 years ago
- Homemade scripts to-do various vulnerable challenges☆78Jan 7, 2021Updated 5 years ago
- Import Nmap scans to Cherrytree☆36Jul 4, 2022Updated 3 years ago
- Tool support for literature review subtle process.☆18May 5, 2017Updated 8 years ago