josh0xA / DoubleAgentLinks
Zero-Day Code Injection and Persistence Technique
☆34Updated 8 years ago
Alternatives and similar repositories for DoubleAgent
Users that are interested in DoubleAgent are comparing it to the libraries listed below
Sorting:
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- privilege escalation by piggy-backing user sudo requests☆16Updated 2 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆13Updated 4 years ago
- ☆27Updated 6 years ago
- ☆53Updated 4 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
- Random Exploits☆50Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆32Updated 3 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆48Updated 4 years ago
- Collection of extra pentest tools for Kali Linux☆109Updated 3 weeks ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆30Updated 3 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Small attempt at a decent Import Address Table (IAT) Dumper☆15Updated last year
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 7 years ago
- A collection of tools created for computer security research purposes.☆132Updated 5 years ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- Repository of tools used in my blog☆51Updated last year
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆175Updated 5 months ago
- ☆19Updated 4 years ago
- Collection of our CTF write-ups☆29Updated 5 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Bare Bones Banking malware coded for research & educational purposes☆88Updated 5 years ago
- Nexus of Android banking Trojans☆15Updated 2 years ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆12Updated 5 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- ☆19Updated 4 years ago
- PowerShell payload generator☆117Updated 4 years ago