mrblacyk / hyder
Multipurpose tool, currently aimed for HackTheBox Battlegrounds
☆20Updated 4 years ago
Alternatives and similar repositories for hyder:
Users that are interested in hyder are comparing it to the libraries listed below
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago
- pwncat windows c2 components☆19Updated 3 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 3 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Basic tool to automate backdooring PE files☆54Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- Burp Suite Pro extension☆10Updated 7 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Noob Penetration tester☆11Updated 10 months ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Get GTFOBins info about a given exploit from the command line☆37Updated 7 months ago
- Finding SSL Blindspots for Red Teams☆32Updated 4 years ago
- Runs sshd as a unprivileged user for persistence☆12Updated 5 years ago
- Reverse Shell troll software☆12Updated 5 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Pentesting notes☆17Updated last month
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago