metrodango / pip3lineView external linksLinks
Swiss Army knife for raw bytes manipulation & interception
☆56Apr 8, 2023Updated 2 years ago
Alternatives and similar repositories for pip3line
Users that are interested in pip3line are comparing it to the libraries listed below
Sorting:
- ☆10Oct 22, 2017Updated 8 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 8 years ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 5 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Jul 24, 2019Updated 6 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- ☆25May 9, 2021Updated 4 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Sep 2, 2016Updated 9 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- ☆14Aug 27, 2025Updated 5 months ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- ☆13Apr 30, 2016Updated 9 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- A modular distributed penetration testing tool.☆41Dec 21, 2016Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- ☆63Mar 21, 2018Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- ☆182Feb 21, 2022Updated 3 years ago
- Exfiltrate data with ICMP☆102Jan 31, 2018Updated 8 years ago
- Get clients and access points.☆48Aug 28, 2019Updated 6 years ago
- UNMAINTAINED - Vulnerability scanner and information gatherer for the Concrete5 CMS☆20Sep 17, 2020Updated 5 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Blaze Telegram Backdoor Toolkit is a post-exploitation tool that leverages the infrastructure of Telegram as a C&C☆206Sep 6, 2018Updated 7 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆63Jan 19, 2026Updated 3 weeks ago
- Slides and reference material from Evading Autoruns presentation at DerbyCon 7 (September 2017)☆106Feb 10, 2021Updated 5 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆353Aug 27, 2018Updated 7 years ago
- Shellcode Encrypter & Decrypter via XOR Cipher☆61Aug 29, 2019Updated 6 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Aug 30, 2016Updated 9 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- LOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses☆63Mar 11, 2016Updated 9 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51May 3, 2016Updated 9 years ago
- An automated SMB relay exploitation script.☆153Oct 11, 2016Updated 9 years ago