iSECPartners / yontma
You'll never take me alive.
☆87Updated 10 years ago
Alternatives and similar repositories for yontma:
Users that are interested in yontma are comparing it to the libraries listed below
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆17Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- ☆15Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- ☆12Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 7 years ago
- Chrome extension for blocking x-origin cookies☆10Updated 8 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Updated 8 months ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 10 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Custom slash command to do ipinfo.io lookups from within Slack☆10Updated 8 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆41Updated 14 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- NMAP Patches and NSE Scripts☆19Updated 11 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 4 months ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago