loveshell / awesome-listLinks
☆9Updated 9 years ago
Alternatives and similar repositories for awesome-list
Users that are interested in awesome-list are comparing it to the libraries listed below
Sorting:
- [Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.☆14Updated 11 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 7 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- A web app scanner☆26Updated 11 years ago
- See here:☆42Updated 12 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆23Updated 7 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 9 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆11Updated 10 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- A collection of shellcodes☆69Updated 13 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆57Updated 5 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago
- Projects and POCs☆60Updated 10 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆16Updated 9 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆30Updated 8 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- A collection of Burp Suite extensions☆30Updated 9 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago