grugq / PORTALofPiView external linksLinks
PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!
☆338Sep 7, 2017Updated 8 years ago
Alternatives and similar repositories for PORTALofPi
Users that are interested in PORTALofPi are comparing it to the libraries listed below
Sorting:
- massively concurrent web scraping☆23Apr 19, 2009Updated 16 years ago
- PIN tool runtracer suite☆43Sep 14, 2015Updated 10 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Mar 8, 2018Updated 7 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- Security tools to use on assessments.☆40May 9, 2016Updated 9 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Python wrapper for DbgEng☆39Nov 21, 2016Updated 9 years ago
- ☆12Aug 29, 2025Updated 5 months ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- LFI scan, exploit tool☆13Nov 19, 2014Updated 11 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Mar 7, 2021Updated 4 years ago
- Mimipenguin密码抓取神器☆26Sep 9, 2017Updated 8 years ago
- libpcap based ICMP encrypted backdoor for linux.☆132Mar 26, 2021Updated 4 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆763Jan 28, 2019Updated 7 years ago
- A sample bot for Cobalt Strike 3☆22Jun 11, 2016Updated 9 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆217Feb 2, 2018Updated 8 years ago
- NSA headline generator☆32Feb 11, 2014Updated 12 years ago
- Small scripts for doing repeatable tasks☆25Apr 30, 2022Updated 3 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- HORSEPILL rootkit PoC☆233Aug 5, 2016Updated 9 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆261Aug 6, 2016Updated 9 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆77Jul 3, 2018Updated 7 years ago
- Rogue AP killer☆91Jan 24, 2018Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- WarBerryPi - Tactical Exploitation☆2,225Nov 9, 2019Updated 6 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆19Aug 19, 2016Updated 9 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Feb 27, 2018Updated 7 years ago
- Docker images for learning wifi hacking☆69Oct 26, 2018Updated 7 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 10 months ago
- A C# penetration testing tool to discover low-haning web fruit via web requests.☆91May 26, 2022Updated 3 years ago
- Cobalt Strike SCT payload obfuscator☆143Jul 7, 2017Updated 8 years ago
- This project is just a dumping ground for random scripts I've developed.☆139Aug 14, 2024Updated last year
- some pocs for antivirus evasion☆131Aug 28, 2023Updated 2 years ago
- Digital Preservation Software (National Archives of Australia)☆38Jul 7, 2011Updated 14 years ago
- Respounder detects presence of responder in the network.☆322Jun 15, 2019Updated 6 years ago
- Automated Linux evil maid attack☆435Dec 22, 2015Updated 10 years ago