j3ssie / documents
TXT and PDF documents from the NSA
☆14Updated 9 years ago
Alternatives and similar repositories for documents:
Users that are interested in documents are comparing it to the libraries listed below
- A full-fledged msfrpc library for Metasploit framework.☆13Updated 7 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 6 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆16Updated 4 years ago
- WebHook for Red Team☆25Updated 4 years ago
- Repository of tools used in my blog☆50Updated 11 months ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 9 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 3 years ago
- Serbian/English wordlist for https://github.com/maurosoria/dirsearch☆19Updated 8 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- ☆17Updated 5 years ago
- pen testing scripts☆11Updated 4 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Tool to automatically email results from your Python scripts to your inbox as text or as a file attachment, storing the sender email acco…☆7Updated 5 years ago
- Red Team Tool Kit☆15Updated 6 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆30Updated 7 years ago
- Automated Penetration Testing☆14Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- ☆13Updated 7 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- ☆20Updated 11 years ago
- Trying to take the dum-dum out of security☆11Updated 7 years ago