PortForce - A custom port Brute Forcing Tool for CTF's & Pentests
☆32Jul 18, 2017Updated 8 years ago
Alternatives and similar repositories for PortForce
Users that are interested in PortForce are comparing it to the libraries listed below
Sorting:
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer☆16Nov 11, 2016Updated 9 years ago
- ☆11Jul 16, 2018Updated 7 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- Security Related Tools and Resources☆16Aug 10, 2017Updated 8 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Oct 11, 2017Updated 8 years ago
- Raptor - Web application firewall [ Stable ]☆15Dec 8, 2016Updated 9 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Jan 17, 2018Updated 8 years ago
- AD-control-paths LDAP submodule☆19Jun 20, 2018Updated 7 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Aug 26, 2022Updated 3 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆35Apr 18, 2013Updated 12 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Simple golang reverse shell☆20Jan 22, 2020Updated 6 years ago
- xdebug reverse shell☆22Jan 18, 2018Updated 8 years ago
- A little Python script for LAN OS detection (nmap -O)☆22Oct 7, 2015Updated 10 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- CTF website frontend for SecGen☆21Aug 11, 2017Updated 8 years ago
- Report and finding templates used by the Serpico reporting tool☆16Sep 26, 2018Updated 7 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Dec 27, 2021Updated 4 years ago
- My pentest cheat sheet☆16Apr 27, 2017Updated 8 years ago
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- A XPath injection demonstration application☆21Nov 14, 2020Updated 5 years ago
- O Scanner vai procurar erros padrões do script SQLI(MySQL,MS ACCESS,Microsoft SQL Server,ORACLE,POSTGRESQL) OU ERROS DE PROGRAMAÇÃO. …☆26Jun 25, 2014Updated 11 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Jul 5, 2016Updated 9 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆65Jul 18, 2024Updated last year
- Collections of tools, scripts, snippets and so on, used in Rev3rse Security Live☆24Dec 4, 2018Updated 7 years ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆28Aug 8, 2022Updated 3 years ago
- Collection of docker containers for security assessments and CTFs. Commandline tool for starting, stopping and managing them.☆23Apr 29, 2022Updated 3 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- 💣 REST and SOAP web API fuzzer☆25May 17, 2016Updated 9 years ago
- Using Ansible as an orchestrator, this project is another solution for testers looking to configure and deploy a new VM or VPS box with t…☆20Dec 3, 2017Updated 8 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆31Jan 25, 2017Updated 9 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- Reverse Shell with Python 3☆26Dec 25, 2020Updated 5 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆26Feb 7, 2017Updated 9 years ago
- ☆30Nov 15, 2018Updated 7 years ago