j-0-t / staekkaView external linksLinks
Stækka Metasploit - Extenting Metasploit
☆54Jul 7, 2017Updated 8 years ago
Alternatives and similar repositories for staekka
Users that are interested in staekka are comparing it to the libraries listed below
Sorting:
- This is a source mirror for 0trace.☆12Mar 4, 2014Updated 11 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- Avoidz tool to bypass most A.V softwares☆139Sep 28, 2017Updated 8 years ago
- pwnig all the (web)things☆21Nov 21, 2020Updated 5 years ago
- rev shell and manager in go☆20Feb 25, 2020Updated 5 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- MUTE (WxKill) is an Python Application that kills wifi signals☆11Jan 31, 2019Updated 7 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Nov 19, 2017Updated 8 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- This is a simple program that allows you to bruteforce a protected web page where the authentication type is Basic Authentication☆11Dec 8, 2022Updated 3 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Upgrade your netcat shell today!☆58Jul 11, 2017Updated 8 years ago
- Mimipenguin密 码抓取神器☆26Sep 9, 2017Updated 8 years ago
- Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords☆22Feb 10, 2021Updated 5 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- A repository full of malware samples.☆13Nov 29, 2020Updated 5 years ago
- Wireless regulatory database for CRDA☆14Aug 1, 2014Updated 11 years ago
- Go command line app to exploit file upload vulnerability☆12Feb 8, 2017Updated 9 years ago
- meow☆12Dec 6, 2015Updated 10 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- ☆11May 28, 2019Updated 6 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆277Feb 12, 2021Updated 5 years ago
- ☆52Sep 24, 2018Updated 7 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Mar 7, 2021Updated 4 years ago
- GHRecommender - personalized recommendations for GitHub projects based on information about repositories starred by the user☆14Feb 3, 2026Updated last week
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- ☆10Dec 13, 2016Updated 9 years ago
- Proof of Concepts of vulnerabilities discovered by me☆11Jan 24, 2024Updated 2 years ago
- Create one or more monitor-mode virtual wireless interfaces with unique mac addresses.☆12Dec 14, 2018Updated 7 years ago
- print syntax highlighted file to terminal☆13Jun 29, 2015Updated 10 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Sep 19, 2017Updated 8 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆58Feb 17, 2018Updated 7 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago