pentest toolbox
☆27Jul 24, 2022Updated 3 years ago
Alternatives and similar repositories for mec-ng
Users that are interested in mec-ng are comparing it to the libraries listed below
Sorting:
- A Telegram bot created for my gf, written in Go☆12Apr 5, 2025Updated 11 months ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 12 years ago
- Run Powershell remotely from the CLI☆11May 1, 2016Updated 9 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- for mass exploiting☆615Jul 14, 2022Updated 3 years ago
- ☆11May 10, 2017Updated 8 years ago
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆12Jan 28, 2017Updated 9 years ago
- Py class that returns fastest http proxy☆55Jan 3, 2019Updated 7 years ago
- [Disclaimer FireROOT] This repository is for research purposes only, the use of this code is your responsibility. CONTACT ME: Attack@dark…☆13Jan 24, 2023Updated 3 years ago
- sudo heap overflow to LPE, in Go☆16Feb 9, 2021Updated 5 years ago
- Node.js DTLS Proxy, library and tools to connect plain-text UDP clients with plain-text UDP servers over an encrypted UDP tunnel..☆14Dec 2, 2018Updated 7 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- Slides from my Area41 security conference talk in Zurich/CH☆18Aug 3, 2019Updated 6 years ago
- Kindly Win x86/x64 DLL Injector☆15Aug 17, 2019Updated 6 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆17Nov 23, 2020Updated 5 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- Unified repository for different Metasploit Framework payloads☆23Oct 25, 2017Updated 8 years ago
- async web crawler☆31Jun 13, 2014Updated 11 years ago
- Docker auditing and enumeration script.☆22Oct 7, 2019Updated 6 years ago
- Remote Administration Tool for Windows☆19Sep 5, 2015Updated 10 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆19Jan 13, 2022Updated 4 years ago
- A cloud based remote android managment suite, powered by NodeJS☆28Dec 12, 2022Updated 3 years ago
- domain name/brand infringement detector. pulls newly registered domains daily, searches variations of your company domain names and alert…☆23Feb 22, 2022Updated 4 years ago
- ☆25Dec 4, 2019Updated 6 years ago
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- EGESPLOIT is a golang library for malware development☆339Jan 26, 2017Updated 9 years ago
- Powershell script for discovering credit cards on a Windows machine☆31Jan 28, 2016Updated 10 years ago
- Modular rootkit framework.☆30Mar 26, 2021Updated 4 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- Phishing scams are more rampant than ever — and I wanted to do something about it. Over the last few weeks, I’ve been working on a proje…☆17Sep 8, 2025Updated 6 months ago
- ☆67Dec 19, 2018Updated 7 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- New and improved Man-In-The-Middle Framework fixes for Nethunter Phones and Tablets☆28Oct 26, 2018Updated 7 years ago
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago