Nameserver DNS poisoning attacks made easy
☆526Feb 26, 2017Updated 9 years ago
Alternatives and similar repositories for JudasDNS
Users that are interested in JudasDNS are comparing it to the libraries listed below
Sorting:
- Dynamic DNS Update Bruteforce Tool☆29Feb 8, 2017Updated 9 years ago
- Automated Linux evil maid attack☆435Dec 22, 2015Updated 10 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆256Mar 30, 2017Updated 8 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- A very simple bridge for performing Flash HTTP requests with JavaScript☆81Jul 21, 2015Updated 10 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Mar 7, 2021Updated 4 years ago
- Exploit the credentials present in files and memory☆843May 25, 2023Updated 2 years ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆182Sep 22, 2016Updated 9 years ago
- A TCP proxy over named pipes. Originally created for maintaining a meterpreter session over 445 for less network alarms.☆243Sep 13, 2021Updated 4 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,018Sep 11, 2017Updated 8 years ago
- Various PoCs☆502Jan 27, 2020Updated 6 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,385Jun 17, 2022Updated 3 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- An exploit for Apache Struts CVE-2017-5638☆441May 21, 2018Updated 7 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- The Credential Mapper☆450Dec 1, 2017Updated 8 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆388Jun 25, 2024Updated last year
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago
- Tools for auditing WAFS☆464Nov 24, 2020Updated 5 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆573Dec 9, 2017Updated 8 years ago
- Cloudflare DNS Enumeration Tool for Pentesters☆523Aug 6, 2022Updated 3 years ago
- OWSAP Damn Vulnerable Web Sockets (DVWS) is a vulnerable web application which works on web sockets for client-server communication.☆354Dec 19, 2025Updated 2 months ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- Image size issues plugin for Burp Suite☆95Jun 27, 2018Updated 7 years ago
- transform your payload.exe into one fake word doc (.ppt)☆468Dec 8, 2019Updated 6 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆633Jun 20, 2017Updated 8 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆269Mar 7, 2021Updated 4 years ago
- An automated XSS payload generator written in python.☆314Jun 2, 2016Updated 9 years ago
- A framework for identifying and launching exploits against internal network hosts. Works via WebRTC IP enumeration combined with WebSocke…☆551Nov 6, 2015Updated 10 years ago
- A security testing Slackbot built with a Kubernetes backend on the Google Cloud Platform☆166Sep 14, 2024Updated last year
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆42Feb 6, 2019Updated 7 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆277Feb 12, 2021Updated 5 years ago