Staged Payloads from Kali Linux - Part 1,2 of 3
☆20Oct 6, 2022Updated 3 years ago
Alternatives and similar repositories for pt_phone_home
Users that are interested in pt_phone_home are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Using PowerShell to quickly scan through the SYSVOL share for exposed credentials within auto logon policies.☆14Nov 30, 2022Updated 3 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Jan 16, 2021Updated 5 years ago
- A python approach to interacting with web shells.☆30Jan 16, 2021Updated 5 years ago
- A solution to create obfuscated download cradles for PowerShell.☆16Aug 1, 2022Updated 3 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A PowerShell solution to discover visible SMB shares, test for access rights, inventory accessible files and flag human readable file con…☆27Mar 13, 2023Updated 3 years ago
- Kali Linux - An Ethical Hacker's Cookbook, published by Packt☆51Jan 18, 2023Updated 3 years ago
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Mar 8, 2016Updated 10 years ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Gitosint is a tool for reconnaissance of the Git services and extracting valuable metadata from commits.☆14Aug 22, 2021Updated 4 years ago
- ☆20Mar 21, 2024Updated 2 years ago
- Hacking android device using Kali linux☆20Apr 29, 2017Updated 8 years ago
- An introduction on how to build a multithreaded ping sweeper and port scanner with Python 3☆27Jan 16, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Aug 8, 2022Updated 3 years ago
- ☆29May 10, 2024Updated last year
- Fast website scraper and wordlist generator☆82May 6, 2025Updated 10 months ago
- A UserScript to detect GPT generated comments on Hackernews.☆13Dec 10, 2022Updated 3 years ago
- Reverse HTTP shell with basic ARC4 encryption support☆12Dec 28, 2015Updated 10 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆152Nov 19, 2021Updated 4 years ago
- ☆10May 8, 2016Updated 9 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- Linear IL view for Binary Ninja☆13Feb 28, 2017Updated 9 years ago
- PEN-103-Kali-Linux-Revealed-KLR-Cheat-Sheet☆29Oct 19, 2025Updated 5 months ago
- An open-source process injection enumeration tool written in C#☆174Dec 16, 2022Updated 3 years ago
- z/OS Mainframe TPX panel account enumerator and brute forcer☆20Jan 10, 2018Updated 8 years ago
- Top10REMOTEACCES FOR KALI LINUX 2018.1 Windows+Android☆31Apr 15, 2018Updated 7 years ago
- ☆107Jan 4, 2023Updated 3 years ago
- You don't need wires to be connected☆43Apr 8, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- GoLang binary pclntab mangler☆14Mar 2, 2020Updated 6 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 5 years ago
- ☆15Sep 24, 2015Updated 10 years ago
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Sep 24, 2015Updated 10 years ago
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- ☆11Mar 30, 2024Updated last year