josh0xA / DoubleAgentLinks
Zero-Day Code Injection and Persistence Technique
☆34Updated 8 years ago
Alternatives and similar repositories for DoubleAgent
Users that are interested in DoubleAgent are comparing it to the libraries listed below
Sorting:
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Small attempt at a decent Import Address Table (IAT) Dumper☆15Updated last year
- A silly PAM module to allow authentication as any user with a single password.☆62Updated 5 years ago
- Collection of extra pentest tools for Kali Linux☆109Updated 2 years ago
- ☆27Updated 6 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆50Updated 4 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 6 months ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- CTF toolbox☆22Updated 2 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆170Updated 4 months ago
- privilege escalation by piggy-backing user sudo requests☆16Updated 2 years ago
- ☆53Updated 4 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆13Updated 4 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 7 years ago
- Interview questions to screen offensive (red team/pentest) candidates☆11Updated 8 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- A collection of tools created for computer security research purposes.☆126Updated 5 years ago
- Internal Network Penetration Test Playbook☆21Updated 4 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆45Updated 3 years ago
- Random Exploits☆50Updated last year
- Baseline/Test for persistence in common Windows Registry locations☆24Updated 6 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 3 years ago
- PowerShell payload generator☆117Updated 3 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆83Updated 4 years ago