hvqzao / xLinks
Pentest environment scaffolding. Supporting role in Kali Linux.
☆12Updated 5 years ago
Alternatives and similar repositories for x
Users that are interested in x are comparing it to the libraries listed below
Sorting:
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 13 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- WAF bypass toolkit☆9Updated 9 years ago
- Format string exploit generation☆10Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- Xss Vulnerability Demonstration framework.☆12Updated 11 years ago
- Broken web app intentionally built with pentesting obstacles☆15Updated 6 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Updated 8 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 3 months ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- Nano meterpreter shell based on TinyMet☆27Updated 8 years ago
- (harmless) mirai botnet client☆14Updated 8 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 9 years ago
- NMAP Patches and NSE Scripts☆19Updated 12 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- FUD Metasploit Android Payload☆11Updated 9 years ago
- Data exfiltration PoC scripts☆25Updated 9 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆22Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Customizable lazy exploit pattern utility.☆13Updated 2 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago