lockedbyte / cryptovenomLinks
Cryptovenom: The Cryptography Swiss Army Knife
☆1Updated 4 years ago
Alternatives and similar repositories for cryptovenom
Users that are interested in cryptovenom are comparing it to the libraries listed below
Sorting:
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 6 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 5 years ago
- Framework for exploiting local vulnerabilities☆84Updated last year
- A Metasploit auto auxiliary script☆104Updated 2 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- ☆106Updated 4 years ago
- ☆102Updated 6 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- Discover target social media profiles☆81Updated 2 years ago
- Collection of tips, tools and tutorials around infosec☆31Updated 8 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- Collect information about email addresses from Pastebin☆37Updated 4 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- Collection of OSCP study material && tools.☆78Updated 6 years ago
- ☆92Updated 2 years ago
- Program to perform vulnerability analysis and automatically generate a report☆57Updated 3 years ago
- Custom tools and projects about security☆110Updated 3 weeks ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆72Updated last year
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 6 years ago
- Extensible Red Team Framework☆111Updated 5 years ago
- Penetration Testing/Security Cheatsheets☆61Updated 9 years ago
- An epic web shell☆85Updated last month
- Red Team Resources☆60Updated 6 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆67Updated 5 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- CPH:SEC - Copenhagen Ethical Hacking and Penetration Testing Society☆43Updated 2 years ago
- HashCobra Hash Cracking tool.☆122Updated 4 years ago
- A ping detection tool for linux☆24Updated 5 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆57Updated 7 years ago