martyjacobsdev / networkingLinks
Adhoc scripts
☆29Updated 8 years ago
Alternatives and similar repositories for networking
Users that are interested in networking are comparing it to the libraries listed below
Sorting:
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 6 years ago
- API testing tool written with Python☆56Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 3 years ago
- A fileless Windows keylogger that exfils via DNS.☆32Updated 8 years ago
- A number of scripts POC's and problems solved as pentests move along.☆44Updated last year
- ☆30Updated 6 years ago
- Search the ExploitDB with a little more control☆22Updated 8 years ago
- ☆26Updated 5 years ago
- Simple reverse shell over Slack☆57Updated 4 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 6 years ago
- Collection of things I've written on pentests to make life easier.☆16Updated 6 years ago
- POC for utilizing wikipedia API for Command and Control☆29Updated 3 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Updated 5 years ago
- Pentest scripts for abuse Bash on Windows (Cygwin/WSL) - HackLu 2018☆45Updated 6 years ago
- A repo containing some stagers and setup scripts for configuring Salt Stack to be a "bad"-ass C2☆18Updated 6 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Updated 9 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- Experimenting with destructive file attacks in Go☆19Updated 6 years ago
- Exploit for win10 SMB3.1☆18Updated 5 years ago
- Red Team Automation tool powered by go and terraform☆33Updated 4 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Updated 7 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Updated 9 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Updated 6 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Updated 6 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 6 years ago