llinsky / Mirai-Counter-Research
☆28Updated this week
Related projects: ⓘ
- Collection of metasploit modules☆65Updated 7 years ago
- Simple reverse ICMP shell☆40Updated 11 years ago
- everything that does not fit elsewhere☆12Updated 6 years ago
- irc bot to scan & bruteforce ssh/telnet☆6Updated 5 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆6Updated 5 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆78Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆47Updated 7 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- Veil Catapult is no longer supported☆76Updated 8 years ago
- ☆103Updated this week
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 7 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Updated 12 years ago
- find public zombie hosts for idle scanning, using shodan search and nmap☆22Updated 9 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆120Updated 5 years ago
- ☆42Updated 10 years ago
- AutoBrowser Screenshot☆48Updated 7 years ago
- ☆42Updated this week
- ☆80Updated this week
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 8 years ago
- ☆75Updated this week
- ☆52Updated 8 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- ☆23Updated this week
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆20Updated 8 years ago
- ☆66Updated this week
- Exfiltrate files over dns requests using Python and/or Bash☆46Updated 8 years ago
- Common Findings Database☆100Updated 5 years ago
- ☆47Updated 8 years ago
- ☆74Updated 2 years ago
- ☆62Updated 11 years ago