jm33-m0 / mec-ngView external linksLinks
pentest toolbox
☆27Jul 24, 2022Updated 3 years ago
Alternatives and similar repositories for mec-ng
Users that are interested in mec-ng are comparing it to the libraries listed below
Sorting:
- masscan result parsing, web server fingerprinting☆17Jul 24, 2022Updated 3 years ago
- A Telegram bot created for my gf, written in Go☆12Apr 5, 2025Updated 10 months ago
- Run Powershell remotely from the CLI☆11May 1, 2016Updated 9 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- for mass exploiting☆613Jul 14, 2022Updated 3 years ago
- [Disclaimer FireROOT] This repository is for research purposes only, the use of this code is your responsibility. CONTACT ME: Attack@dark…☆12Jan 24, 2023Updated 3 years ago
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆12Jan 28, 2017Updated 9 years ago
- Py class that returns fastest http proxy☆55Jan 3, 2019Updated 7 years ago
- sudo heap overflow to LPE, in Go☆16Feb 9, 2021Updated 5 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 3 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- find where an image is taken☆18Jul 14, 2022Updated 3 years ago
- Slides from my Area41 security conference talk in Zurich/CH☆18Aug 3, 2019Updated 6 years ago
- Kindly Win x86/x64 DLL Injector☆15Aug 17, 2019Updated 6 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- Hack for RUHacks☆19May 27, 2018Updated 7 years ago
- Unified repository for different Metasploit Framework payloads☆23Oct 25, 2017Updated 8 years ago
- C# source code obfuscator☆18Jun 20, 2019Updated 6 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- async web crawler☆31Jun 13, 2014Updated 11 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- Docker auditing and enumeration script.☆22Oct 7, 2019Updated 6 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- Remote Administration Tool for Windows☆19Sep 5, 2015Updated 10 years ago
- A cloud based remote android managment suite, powered by NodeJS☆28Dec 12, 2022Updated 3 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆19Jan 13, 2022Updated 4 years ago
- A java based google hacking tool that allows to do advanced search on google, also to search in google hacking database and exploit datab…☆23Dec 7, 2016Updated 9 years ago
- manage your wechat with telegram bot☆24Jul 24, 2022Updated 3 years ago
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- ☆25Dec 4, 2019Updated 6 years ago
- Get ports,vulnerabilities,informations,banners,..etc for any IP with Shodan (no apikey! no rate-limit!)☆25Jun 3, 2020Updated 5 years ago
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- Simple c# source code obfuscator☆28Feb 13, 2018Updated 8 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- Powershell script for discovering credit cards on a Windows machine☆30Jan 28, 2016Updated 10 years ago