jossets / YoloToolbox
Beginners tools for CTF
☆18Updated 2 years ago
Alternatives and similar repositories for YoloToolbox:
Users that are interested in YoloToolbox are comparing it to the libraries listed below
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 3 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 3 years ago
- ☆29Updated 4 years ago
- ☆45Updated 4 years ago
- Creates and sends fake meeting invite☆59Updated 4 years ago
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- This repo will contain some basic pentest/RT commands.☆37Updated 2 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆108Updated last year
- ☆37Updated last year
- Password list generator for password spraying - prebaked with goodies☆103Updated 2 years ago
- OSWE Preparation☆37Updated 5 years ago
- Some random tools I use for penetration testing☆88Updated 2 weeks ago
- Bash script to generate reverse shell payloads☆19Updated last year
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- ☆47Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- ☆38Updated 2 years ago
- A project aimed at automating and making repetitive tasks easy while pentesting , like creating msf payloads or a one-liner reverse shel…☆11Updated 2 years ago
- Penetration Test Methodology☆16Updated this week
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆13Updated last year
- A python approach to interacting with web shells.☆30Updated 4 years ago
- ☆81Updated 4 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- Reverse Shell-able Windows exploits short POCs.☆31Updated 4 years ago
- https://medium.com/@mansoorr/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8☆57Updated 4 years ago
- A shellcode crypto-packing tool for PoC (used with msfvenom payloads)☆17Updated 2 years ago
- ☆31Updated 4 years ago
- ☆20Updated 3 years ago