python scripts for penetration testing
☆11Oct 17, 2019Updated 6 years ago
Alternatives and similar repositories for NonzyToolkit
Users that are interested in NonzyToolkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆13Aug 31, 2019Updated 6 years ago
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆24Aug 14, 2023Updated 2 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- ☆17Mar 21, 2019Updated 7 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆11Apr 6, 2026Updated last week
- Self defense post module for metasploit☆17Aug 30, 2019Updated 6 years ago
- OpenArk is a open source anti-rookit(Ark) tool on Windows.☆18Jul 18, 2019Updated 6 years ago
- ☆21Oct 3, 2019Updated 6 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- ☆18Sep 21, 2019Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- A collection of beautified and commented samples of malware implemented in Bash☆23Apr 4, 2023Updated 3 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Sep 9, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- POC for utilizing wikipedia API for Command and Control☆29Dec 8, 2022Updated 3 years ago
- ☆11Apr 23, 2019Updated 6 years ago
- Repository of various scripts related to Mobile PT. Copyrights and Licensing terms belong to respective owners.☆12Nov 4, 2019Updated 6 years ago
- Searches for the carrier unlock code for the Samsung Galaxy S 4G in a fast and easy way☆13May 18, 2015Updated 10 years ago
- Utility to generate a TLS Certificate.☆17Apr 11, 2020Updated 6 years ago
- RAS(RAndom Subdomain) Fuzzer☆42Jan 22, 2020Updated 6 years ago
- Remote shell victim machines☆23Sep 13, 2019Updated 6 years ago
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago
- ☆14Aug 27, 2025Updated 7 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Collection of over 9000 xss payloads | heavy xss collection☆13Dec 6, 2022Updated 3 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆248Sep 9, 2021Updated 4 years ago
- Use powershell to getsystem with token dumplication☆10Dec 6, 2019Updated 6 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- PowerShell Pass The Hash Utils☆16Dec 9, 2018Updated 7 years ago
- Python-Based Pentesting Framework☆31Dec 7, 2022Updated 3 years ago
- Text-to-Speech Synthesis by Generating Spectrograms using Generative Adversarial Network☆10Dec 12, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Windows Privilege Escalation☆10Dec 27, 2014Updated 11 years ago
- Automatic UAC-Bypassing for custom payloads during privilege escalation testing☆98Aug 13, 2022Updated 3 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- python-shellcode加载器☆11Oct 28, 2019Updated 6 years ago
- Utilizing MMF as a execution space for shell code☆10Aug 28, 2018Updated 7 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago