mazen160 / shenninaLinks
Automating Host Exploitation with AI
☆537Updated 2 years ago
Alternatives and similar repositories for shennina
Users that are interested in shennina are comparing it to the libraries listed below
Sorting:
- ☆1,973Updated last year
- A python script to scan for Apache Tomcat server vulnerabilities.☆837Updated 3 months ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆528Updated last year
- Collection of PoC and offensive techniques used by the BlackArrow Red Team☆1,123Updated 10 months ago
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,478Updated 9 months ago
- An XSS exploitation command-line interface and payload generator.☆1,375Updated 4 months ago
- Sticky notes for pentesting, bug bounty, CTF.☆699Updated last month
- TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things☆699Updated this week
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,973Updated 3 weeks ago
- Nuclei plugin for BurpSuite☆1,257Updated 8 months ago
- ↕️🤫 Stealth redirector for your red team operation security☆686Updated 9 months ago
- Asset discovery and identification tools 快速识别 Web 指纹信息,定位资产类型。辅助红队快速定位目标资产信息,辅助蓝队发现疑似脆弱点☆2,096Updated last year
- Awesome EDR Bypass Resources For Ethical Hacking☆1,206Updated this week
- ☆374Updated last week
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,670Updated 7 months ago
- Nuclei AI - Browser Extension for Rapid Nuclei Template Generation☆515Updated 5 months ago
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆795Updated last year
- Black Hat Asia 2023 PDF Public☆573Updated 2 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆1,977Updated 2 months ago
- Linux/Windows post-exploitation framework made by linux user☆1,555Updated last month
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,374Updated 3 years ago
- Pentesting automation platform that combines hacking tools to complete assessments☆466Updated this week
- A simple tool for bypassing file upload restrictions.☆853Updated 10 months ago
- Pre-Built Vulnerable Multiple API Scenarios Environments Based on Docker-Compose.☆403Updated 2 years ago
- evilginx3 + gophish☆1,800Updated 11 months ago
- GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsof…☆588Updated 2 months ago
- ☆520Updated 2 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆865Updated 2 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,019Updated 2 years ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆1,704Updated last week