An automated scanning, enumeration, and note taking tool for pentesters
☆13Jul 26, 2022Updated 3 years ago
Alternatives and similar repositories for EV1L-J3ST3R
Users that are interested in EV1L-J3ST3R are comparing it to the libraries listed below
Sorting:
- Deploy redteam infrastructure☆17Mar 9, 2021Updated 5 years ago
- United States Air Force Academy public tools☆18Nov 9, 2024Updated last year
- various slides and presentations I've worked on☆19Mar 21, 2025Updated 11 months ago
- Hooking calls to libssl (openssl) to decrypt ssl traffic☆19Nov 16, 2020Updated 5 years ago
- Linux rust keylogger☆18Mar 1, 2024Updated 2 years ago
- Darkbit Cloud Security Tools☆25Nov 12, 2020Updated 5 years ago
- Command and Control that uses NTP as the transport protocol.☆26Jan 29, 2022Updated 4 years ago
- Scripts for securing Windows, Debian, and Ubuntu machines.☆22Aug 22, 2018Updated 7 years ago
- PAM Backdoor☆32Mar 29, 2023Updated 2 years ago
- A python script to force authentication using MS-RPRN RemoteFindFirstPrinterChangeNotificationEx function (opnum 65).☆30Feb 11, 2025Updated last year
- Scripts and things.☆13Jan 23, 2026Updated last month
- Penguin OS Forensic (or Flight) Recorder☆40Dec 25, 2024Updated last year
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆38Apr 4, 2022Updated 3 years ago
- Python3 version of UC Berkeley's CS 188 Pacman Capture the Flag project☆10Mar 14, 2024Updated last year
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated last month
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆41Aug 9, 2023Updated 2 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- Random HTTP User-Agent string generator☆11Oct 22, 2014Updated 11 years ago
- A "custom" layer 4 protocol for raw socket communication on linux. Golang library.☆10Dec 20, 2018Updated 7 years ago
- tool to send packet using "gopacket".☆11Aug 11, 2017Updated 8 years ago
- 🦈 Prometheus exporter for pcap metrics☆16Feb 15, 2023Updated 3 years ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 8 months ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass☆12Dec 31, 2023Updated 2 years ago
- ☆14Apr 6, 2025Updated 11 months ago
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 2 months ago
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆11Dec 8, 2022Updated 3 years ago
- Apache OfBiz Auth Bypass Scanner for CVE-2023-51467☆11Dec 31, 2023Updated 2 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- ☆11Dec 8, 2023Updated 2 years ago
- Linux Wiper & Cryptor Via Base Utils☆10Sep 14, 2024Updated last year
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 2 years ago
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆16Feb 1, 2026Updated last month
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- A list of backdoor samples I find online.☆13Dec 16, 2019Updated 6 years ago
- 🎙️ Retroactively fix your Zoom recordings with a click! Won 1st Place, Best Use of GCP, Best Start-Up, and Best Entrepreneurial Hack at …☆10Feb 10, 2022Updated 4 years ago
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 5 months ago