mrblacyk / hyderLinks
Multipurpose tool, currently aimed for HackTheBox Battlegrounds
☆21Updated 4 years ago
Alternatives and similar repositories for hyder
Users that are interested in hyder are comparing it to the libraries listed below
Sorting:
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆42Updated 4 years ago
- pwncat windows c2 components☆19Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Runs sshd as a unprivileged user for persistence☆12Updated 6 years ago
- ☆14Updated last year
- Bash script to generate reverse shell payloads☆19Updated last year
- Various scripts & tools☆12Updated last year
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Burp Suite Pro extension☆10Updated 8 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Finding SSL Blindspots for Red Teams☆32Updated 4 years ago
- Noob Penetration tester☆11Updated last year
- A Burp Suite extension for headless, unattended scanning.☆36Updated 5 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Extract endpoints from specific Git repository for fuzzing☆23Updated 4 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆26Updated 5 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Updated 3 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- offensive notes & resources☆43Updated 2 months ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Automate Auxiliary Module in Metasploit☆20Updated 4 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆23Updated 3 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago