jedisct1 / blacknurseLinks
BlackNurse attack PoC
☆176Updated 8 years ago
Alternatives and similar repositories for blacknurse
Users that are interested in blacknurse are comparing it to the libraries listed below
Sorting:
- Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)☆180Updated 8 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175Updated 9 years ago
- Fuzzbunch Python-Wine wrapper☆56Updated 8 years ago
- This repository contains some bettercap transparent proxy example modules.☆281Updated 7 years ago
- Public repository for improvements to the EXTRABACON exploit☆162Updated 9 years ago
- Rainmap Lite - Responsive web based interface that allows users to launch Nmap scans from their mobiles/tablets/web browsers!☆233Updated 4 years ago
- SSLStrip version to defeat HSTS☆321Updated 8 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆261Updated 8 years ago
- Detect and prevent KRACK attacks in your network☆182Updated 8 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Updated 7 years ago
- Create a DDOS attack using SNMP servers☆44Updated 11 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆141Updated 8 years ago
- SpiderLabs shared Nmap Tools☆229Updated 5 years ago
- [unmaintained] Post-exploitation tool☆183Updated 9 years ago
- Honeypot deployment made easy☆237Updated 6 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆70Updated 5 years ago
- Recon, Subdomain Bruting, Zone Transfers☆231Updated 9 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆201Updated 9 years ago
- High-interaction MitM SSH honeypot☆170Updated 7 years ago
- Create fake AP in Kali with 1 command☆269Updated 9 years ago
- Proof of concepts of attacks against Wi-Fi implementations☆140Updated 7 years ago
- War Child denial of service testing suite☆123Updated 8 years ago
- Advanced Controller/Server/Client Reverse Shell/Bot – Windows/Linux – Python☆68Updated 9 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆147Updated 9 years ago
- Blaze Telegram Backdoor Toolkit is a post-exploitation tool that leverages the infrastructure of Telegram as a C&C☆205Updated 7 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆137Updated 7 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆346Updated 8 years ago
- Offensive DNS server☆323Updated 3 years ago
- Python framework for IT security tools☆268Updated 8 years ago
- DDoS attacks via other sites execution tool (DAVOSET) - it is command line tool for conducting DDoS attacks on the sites via Abuse of Fun…☆127Updated 6 years ago