mrblacyk / hyder
Multipurpose tool, currently aimed for HackTheBox Battlegrounds
☆20Updated 4 years ago
Alternatives and similar repositories for hyder:
Users that are interested in hyder are comparing it to the libraries listed below
- Pentesting notes☆17Updated last year
- pwncat windows c2 components☆17Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- Finding SSL Blindspots for Red Teams☆30Updated 4 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Updated 5 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- Simple C2 over the Trello API☆37Updated 2 years ago
- Command and Control Framework☆14Updated 9 months ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 3 years ago
- Get GTFOBins info about a given exploit from the command line☆37Updated 5 months ago
- Runs sshd as a unprivileged user for persistence☆12Updated 5 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- A collection of OSCE preparation resources.☆23Updated 5 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Noob Penetration tester☆11Updated 7 months ago
- A python approach to interacting with web shells.☆29Updated 4 years ago
- Use python to perform Kerberos pre-auth bruteforcing☆11Updated 2 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆17Updated 2 years ago
- Useful note☆15Updated last week
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Updated 4 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago