☆57Sep 2, 2018Updated 7 years ago
Alternatives and similar repositories for pentest
Users that are interested in pentest are comparing it to the libraries listed below
Sorting:
- apache solr 5.x - 8.2.0 rce (with config api)☆11Oct 31, 2019Updated 6 years ago
- Tool to acquire netNTLM hashes on a local machine wihtout network traffic☆13May 18, 2018Updated 7 years ago
- Set Up WebDAV Server for Remote File Sharing and more☆35Aug 22, 2019Updated 6 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- Just pick out the code we need.☆65Nov 22, 2019Updated 6 years ago
- Using GNU lightning to generate xor deobfuscation at runtime☆27Aug 22, 2017Updated 8 years ago
- ACTIVELabs Security Advisories☆24May 19, 2021Updated 4 years ago
- A centralized Python botnet that currently supports HTTP, TCP and UDP flood attacks.☆14Jul 6, 2025Updated 8 months ago
- 🌈 Render PowerShell in the Terminal with Syntax Highlighting☆10May 25, 2023Updated 2 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Sep 4, 2018Updated 7 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22May 24, 2019Updated 6 years ago
- Monitor adapter, Fake DNS, Tunnel, and DHCP combined into one Windows Service☆12Apr 19, 2015Updated 10 years ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆15Apr 21, 2025Updated 10 months ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Host Header Injection Scanner☆50Oct 27, 2020Updated 5 years ago
- A list of webshells☆17Jul 1, 2023Updated 2 years ago
- ☆12Oct 18, 2019Updated 6 years ago
- glibc getcwd() local privilege escalation compiled binaries☆32Feb 9, 2018Updated 8 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- 一些漏洞的环境/利用工具/分析☆10Jul 24, 2020Updated 5 years ago
- Scripts to automate standing up hosts in Linode☆15Feb 16, 2021Updated 5 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- OutCHM就是可以生成一个CHM啦。☆14Nov 9, 2016Updated 9 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- Useful commands for pentesting Linux and Windows systems☆14Jul 18, 2020Updated 5 years ago
- A curated repository of the tools, scripts, resources and programs I use regularly for CTF, BB or other security work.☆15Aug 4, 2021Updated 4 years ago
- couchdb remote command exec.☆14Mar 27, 2018Updated 7 years ago
- PoC exploit for CVE-2018-5234☆31May 2, 2018Updated 7 years ago
- ☆32Sep 14, 2017Updated 8 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 3 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Oct 15, 2020Updated 5 years ago
- Scripts,shell used for solving box☆15Dec 28, 2020Updated 5 years ago
- collect☆17Aug 29, 2019Updated 6 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Dec 18, 2017Updated 8 years ago
- CVE-2018-15982_PoC☆14Nov 6, 2019Updated 6 years ago
- ☆32Aug 9, 2019Updated 6 years ago