j3ssie / documentsLinks
TXT and PDF documents from the NSA
☆15Updated 10 years ago
Alternatives and similar repositories for documents
Users that are interested in documents are comparing it to the libraries listed below
Sorting:
- A full-fledged msfrpc library for Metasploit framework.☆13Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 10 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 6 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆16Updated 4 years ago
- pen testing scripts☆11Updated 4 years ago
- Trying to take the dum-dum out of security☆11Updated 7 years ago
- Repository of tools used in my blog☆51Updated last year
- ☆20Updated 11 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Metasploit/MSFVenom Payload Generator Stand Alone☆32Updated 8 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Automated Penetration Testing☆14Updated 4 years ago
- Web App Pen Tester (Web Interface)☆31Updated 2 years ago
- A pentesting Firefox spy extension - PoC☆9Updated 8 years ago
- Google Hack Database dork automatic tool.☆24Updated 7 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- Pentest ToolKit☆28Updated 5 years ago
- Just a better dirbuster☆13Updated 2 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- ☆33Updated 4 months ago
- ☆15Updated 3 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆21Updated 5 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago