mmpx12 / pwndbLinks
another pwndb tool with more options
☆16Updated 4 years ago
Alternatives and similar repositories for pwndb
Users that are interested in pwndb are comparing it to the libraries listed below
Sorting:
- Interview questions to screen offensive (red team/pentest) candidates☆11Updated 8 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆61Updated 2 years ago
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into co…☆21Updated 3 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Legba recipes.☆50Updated last year
- Undetectable Windows Payload Generation☆10Updated 7 years ago
- Collection of extra pentest tools for Kali Linux☆109Updated last week
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 9 years ago
- Collection of hashcat lists and things.☆51Updated 5 years ago
- Just a better dirbuster☆13Updated 2 years ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆32Updated 7 months ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆21Updated 3 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Updated 3 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- A swiss army knife for pentesting networks☆26Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Updated 5 years ago
- ☆23Updated 4 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆54Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- A script to automate keystrokes through a graphical desktop program.☆34Updated 3 months ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆16Updated 3 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- Apache Tomcat Manager API WAR Shell Upload☆35Updated 5 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 2 years ago