josh0xA / DoubleAgentLinks
Zero-Day Code Injection and Persistence Technique
☆34Updated 8 years ago
Alternatives and similar repositories for DoubleAgent
Users that are interested in DoubleAgent are comparing it to the libraries listed below
Sorting:
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 7 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 3 years ago
- Small attempt at a decent Import Address Table (IAT) Dumper☆15Updated last year
- A collection of tools created for computer security research purposes.☆131Updated 5 years ago
- ☆28Updated 6 years ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆174Updated 6 months ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆13Updated 4 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- Fast and intuitive manager for multiple reverse shells☆86Updated 10 months ago
- Collection of extra pentest tools for Kali Linux☆109Updated last month
- Interview questions to screen offensive (red team/pentest) candidates☆12Updated 8 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- privilege escalation by piggy-backing user sudo requests☆16Updated 2 years ago
- ☆23Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Wireless Pentesting Device☆24Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- ☆13Updated 2 years ago
- Windows privilege escalation with cmd☆90Updated 3 years ago
- PowerShell payload generator☆118Updated 4 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- ☆30Updated last year
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- ☆22Updated 9 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆75Updated 5 years ago