gsmith257-cyber / EV1L-J3ST3R
An automated scanning, enumeration, and note taking tool for pentesters
☆12Updated 2 years ago
Related projects: ⓘ
- Classic Web shell upload techniques☆18Updated 2 months ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆30Updated 2 years ago
- A "Spring4Shell" vulnerability scanner.☆50Updated 2 years ago
- Files for my Python3 Create Your Own Tool Series☆23Updated 2 years ago
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆16Updated 2 years ago
- A not-curated list of cloud hacking labs☆19Updated 5 months ago
- Small python script wrapper for automating hashcat commands☆32Updated 3 years ago
- Personal notes from Red teamer for Blue/Red/Purple.☆51Updated 7 months ago
- Autorev.sh generates reverse shell codes for reverse shell . Supports linux and windows☆16Updated 2 years ago
- Bash script to generate reverse shell payloads☆20Updated last year
- ☆41Updated last year
- This is a simple C++ program that will copy clipboard data and upload it to a webserver of your choice!☆15Updated 8 months ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security☆10Updated 9 months ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆22Updated 2 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆17Updated 2 months ago
- A script used to query the dehashed API and filter for more useful results☆14Updated 3 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆27Updated 3 years ago
- your bestfried for finding LinkedIn Employees on github☆16Updated last year
- This contains the contents needed to deploy a home lab in VirtualBox.☆17Updated 4 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated last year
- ☆52Updated last year
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆22Updated 7 months ago
- A Simple Password Protected Back Door written in Python3☆21Updated last year
- ☆16Updated 3 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆27Updated last month
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆24Updated 2 years ago
- Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined mod…☆18Updated 3 years ago
- Ease and assist the compromise of an Active Directory environment.☆25Updated 3 years ago
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 2 years ago