j3ssie / documentsLinks
TXT and PDF documents from the NSA
☆15Updated 10 years ago
Alternatives and similar repositories for documents
Users that are interested in documents are comparing it to the libraries listed below
Sorting:
- A full-fledged msfrpc library for Metasploit framework.☆13Updated 8 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 6 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- SMBMap is a handy SMB enumeration tool☆38Updated last year
- Package manager for hackers built by hackers☆37Updated 7 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Updated 5 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆56Updated 5 years ago
- Trying to take the dum-dum out of security☆12Updated 8 years ago
- ☆53Updated 4 years ago
- pinky - The PHP mini RAT (Remote Administration Tool)☆78Updated 7 years ago
- pen testing scripts☆12Updated 4 years ago
- An0n 3xPloiTeR Shell☆35Updated 6 years ago
- Modern problems require modern solutions☆32Updated 2 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- ☆33Updated 9 months ago
- Simple Karma Attack☆69Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- NOGO is a packaging script that creates fully undetectable payloads specializing in disabling anti-virus. Created for pentesting (crippli…☆13Updated 6 years ago
- ☆17Updated 6 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 4 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated last year
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 10 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆53Updated 7 years ago
- ☆82Updated 2 years ago
- Metasploit/MSFVenom Payload Generator Stand Alone☆31Updated 8 years ago
- A Remote Access Tool using Google Apps Script as the proxy for command and control.☆114Updated 4 years ago
- gui tool to create normal payload by msfvenom☆34Updated 6 years ago