mmpx12 / pwndbLinks
another pwndb tool with more options
☆15Updated 4 years ago
Alternatives and similar repositories for pwndb
Users that are interested in pwndb are comparing it to the libraries listed below
Sorting:
- Interview questions to screen offensive (red team/pentest) candidates☆12Updated 8 years ago
- Legba recipes.☆51Updated last year
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 5 years ago
- Undetectable Windows Payload Generation☆10Updated 8 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63Updated 2 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆17Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆16Updated 9 years ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆17Updated 2 years ago
- Custom pentesting tools☆26Updated 5 years ago
- Just a better dirbuster☆13Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆113Updated 4 months ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆24Updated last year
- A PowerShell script that simplifies life and therefore... phishing.☆20Updated 3 years ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆35Updated last month
- ☆18Updated 3 years ago
- Wireless Pentesting Device☆24Updated 5 years ago
- WiFi arsenal☆17Updated 5 years ago
- Collection of hashcat lists and things.☆51Updated 6 years ago
- Script to perform some hashcracking logic automagically☆80Updated 2 months ago
- A swiss army knife for pentesting networks☆26Updated 3 years ago
- Dehashed API CLI☆22Updated 5 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16Updated 6 years ago
- ☆16Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Updated 5 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆10Updated 3 years ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆39Updated 4 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Updated 3 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Updated 9 months ago