j3ssie / documentsLinks
TXT and PDF documents from the NSA
☆15Updated 10 years ago
Alternatives and similar repositories for documents
Users that are interested in documents are comparing it to the libraries listed below
Sorting:
- A full-fledged msfrpc library for Metasploit framework.☆13Updated 8 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 6 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Updated 5 years ago
- Package manager for hackers built by hackers☆37Updated 7 years ago
- pen testing scripts☆12Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- It is a tool that brings together exploits and news about security and vulnerabilities, with the intention of contributing to the open so…☆64Updated 6 years ago
- Metasploit/MSFVenom Payload Generator Stand Alone☆31Updated 8 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Updated 5 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- Simple script to download some missing tools in Kali☆33Updated 5 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆53Updated 7 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆87Updated 6 years ago
- SMBMap is a handy SMB enumeration tool☆38Updated last year
- Repository of tools used in my blog☆52Updated last year
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆56Updated 5 years ago
- ☆53Updated 4 years ago
- Web App Pen Tester (Web Interface)☆32Updated 3 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆85Updated 4 years ago
- Wi-Fi Exploit Tool☆51Updated 5 years ago
- Collections of way to evade normal detection events.☆24Updated 5 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 4 months ago
- Automate the creation of Backdoors and postexplotation activities☆23Updated 3 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Some scripts useful for red team activities☆13Updated 5 years ago
- Airodump-ng WiFi Scan Visualizer☆61Updated 7 years ago