lockedbyte / cryptovenom
Cryptovenom: The Cryptography Swiss Army Knife
☆1Updated 4 years ago
Alternatives and similar repositories for cryptovenom:
Users that are interested in cryptovenom are comparing it to the libraries listed below
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- A Metasploit auto auxiliary script☆104Updated 2 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 4 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆66Updated 5 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- CTF write-ups repository☆42Updated last year
- An advanced graphical search engine for Exploit-DB☆118Updated 11 months ago
- DEFCON 27 slides and workshop materials.☆127Updated 4 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- Linux Privilege Escalation Tool☆184Updated 6 years ago
- Framework for exploiting local vulnerabilities☆84Updated last year
- useful pentest note☆66Updated last month
- [A]ndroid [A]pplication [P]entest [G]uide☆124Updated 5 years ago
- ☆105Updated 3 years ago
- A Linux enumeration script for Hack The Box☆189Updated 5 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 6 years ago
- ☆102Updated 5 years ago
- A collection of my Dockerfiles☆90Updated 2 years ago
- Tool to automate the whole process of environment in android audits☆14Updated 6 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 6 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆73Updated 5 years ago
- Extensible Red Team Framework☆111Updated 5 years ago
- Enyx SNMP IPv6 Enumeration Tool☆102Updated 2 years ago
- Unicode encoding attacks with machine learning☆96Updated 3 years ago
- Pypykatz server☆125Updated 6 years ago
- A bunch of my exploit development helper tools, collected in one place.☆141Updated 2 years ago
- Automate Metasploit scanning and exploitation☆115Updated 7 months ago
- Common password pattern generator using strings list☆132Updated 4 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago