infinite-horizon219 / PELTView external linksLinks
Post Exploitation Linux Toolkit
☆20Dec 31, 2014Updated 11 years ago
Alternatives and similar repositories for PELT
Users that are interested in PELT are comparing it to the libraries listed below
Sorting:
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆10Jan 27, 2014Updated 12 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 12 years ago
- PowerShell HTTP(s) Intercepting Proxy☆14Sep 30, 2014Updated 11 years ago
- Scripts for automating actions in Cobalt Strike☆11Jul 1, 2016Updated 9 years ago
- a exec jsp shell, simply like weevely php C/S shell.☆14Jun 21, 2022Updated 3 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- ☆13Apr 21, 2019Updated 6 years ago
- A simple C library for entropy measurement of byte streams and other data.☆14Dec 9, 2019Updated 6 years ago
- search and collect windows files from multiple locations on machine and store in one centralized directory☆20Aug 29, 2012Updated 13 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- Helpful operator notes and techniques in actionable form☆17Aug 11, 2023Updated 2 years ago
- Resurrecting and updating the best log cleaner☆36Jan 2, 2015Updated 11 years ago
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- ☆18Mar 28, 2015Updated 10 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Aug 25, 2014Updated 11 years ago
- Windows 8.1 + IE 11 Exploit☆18Jul 26, 2016Updated 9 years ago
- Tools made for Tizen Security Analysis☆14Jun 2, 2015Updated 10 years ago
- This version touches disk for registry persistence.☆26Oct 6, 2015Updated 10 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago
- vmware-backdoor☆33Jul 11, 2021Updated 4 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- A Burp Extender plugin, that will deserialized java objects and encode them in XML using the Xtream library.☆26Apr 14, 2015Updated 10 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- DLL to use the power of Pafish☆32Oct 5, 2021Updated 4 years ago
- Simple php backdoor based on extension☆22Feb 12, 2015Updated 11 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- Dump of all my hash-cracking related stuffs.☆23May 16, 2019Updated 6 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 7 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 12 years ago
- Python script to patch the reflective stub in a DLL☆24Apr 9, 2017Updated 8 years ago
- Binary resource copier☆99Apr 14, 2025Updated 10 months ago