mayhemiclabs / claymore
Claymore WiFi Honeypot
☆16Updated 12 years ago
Related projects: ⓘ
- Shovels a shell back to you on a specified port☆9Updated 3 years ago
- a CMD shell in masm that listens on port 8080☆12Updated 3 years ago
- ☆17Updated 9 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 3 years ago
- An application for distributing oclHashcat tasks.☆21Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Automated install process for Phishing Frenzy☆23Updated 9 years ago
- ☆14Updated this week
- Simple web app for displaying cowrie data in your browser☆12Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- packetstormsecurity.net exploit archive 133ch3r☆23Updated 13 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆17Updated 10 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 9 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 9 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Next Generation of White Chapel☆21Updated 9 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 8 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- Linux and Windows Hardening Points☆12Updated 6 years ago
- Nano meterpreter shell based on TinyMet☆27Updated 8 years ago
- Scripts to query local admins quickly☆9Updated 8 years ago
- ☆11Updated 8 years ago
- ☆13Updated this week
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 9 years ago
- Tools for use with phishing frenzy☆11Updated 5 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆12Updated 10 years ago
- See here:☆41Updated 11 years ago