kgretzky / pwndropLinks
Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.
☆2,152Updated 2 years ago
Alternatives and similar repositories for pwndrop
Users that are interested in pwndrop are comparing it to the libraries listed below
Sorting:
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,868Updated 2 years ago
- A collaborative, multi-platform, red teaming framework☆3,777Updated this week
- Automation for internal Windows Penetrationtest / AD-Security☆3,508Updated 7 months ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,778Updated 2 years ago
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.☆1,510Updated 3 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,103Updated 3 years ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,663Updated 2 weeks ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,823Updated last year
- Connect like there is no firewall. Securely.☆1,700Updated 3 weeks ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,161Updated last month
- Starkiller is a Frontend for PowerShell Empire.☆1,503Updated 3 months ago
- File upload vulnerability scanner and exploitation tool.☆3,215Updated last month
- Fancy reverse and bind shell handler☆2,760Updated 10 months ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,276Updated 2 months ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,568Updated 3 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,338Updated 8 months ago
- evilginx3 + gophish☆1,818Updated last year
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,240Updated 8 months ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆1,954Updated this week
- pwning IPv4 via IPv6☆1,812Updated last year
- Windows Exploit Suggester - Next Generation☆4,492Updated this week
- The ultimate WinRM shell for hacking/pentesting☆4,900Updated 6 months ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,400Updated 3 months ago
- A tool to perform Kerberos pre-auth bruteforcing☆2,962Updated 10 months ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,359Updated 3 months ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,434Updated 11 months ago
- Monitor linux processes without root permissions☆5,511Updated 2 years ago
- SMBMap is a handy SMB enumeration tool☆1,921Updated 3 months ago
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,373Updated 4 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,350Updated 2 months ago