mdawsonuk / Lancer
☆16Updated this week
Related projects: ⓘ
- Automated Tools Pentest☆5Updated last year
- best framework for information gathering ,pentesting and web aplication scanner☆9Updated 6 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆33Updated 9 months ago
- Cross-Site-Scripting (XSS) Automatic Scanner☆42Updated 3 years ago
- Get a reverse shell within 15 seconds on both Windows or Unix based systems, using the Digispark developement board.☆43Updated 3 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆35Updated 5 years ago
- ☆24Updated 4 years ago
- Simple Karma Attack☆66Updated 3 years ago
- ☆29Updated this week
- Wiki to collect Red Team infrastructure hardening resources☆18Updated 6 years ago
- ☆13Updated 6 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- ☆70Updated this week
- One line PS scripts that may come handy during your network assesment☆72Updated 4 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25Updated 5 years ago
- PortForce - A custom port Brute Forcing Tool for CTF's & Pentests☆23Updated 7 years ago
- A simple Script which tests for LFI (Local File Inclusion) via Curl☆16Updated 5 years ago
- ☆74Updated this week
- Script is a proof of concept how to control your machine by using social media sites.☆17Updated 6 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆91Updated 4 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆65Updated 11 months ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆82Updated 6 years ago
- ☆61Updated this week
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆12Updated 6 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆22Updated 6 years ago
- ☆20Updated this week
- ☆21Updated this week
- ☆31Updated this week
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60Updated 5 years ago