mrblacyk / hyderLinks
Multipurpose tool, currently aimed for HackTheBox Battlegrounds
☆21Updated 4 years ago
Alternatives and similar repositories for hyder
Users that are interested in hyder are comparing it to the libraries listed below
Sorting:
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Updated 4 years ago
- A reverse shell in PHP using Unicode encoding as variable assignment☆20Updated 4 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- ☆20Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Pentest stuff☆49Updated last year
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆109Updated last year
- pwncat windows c2 components☆19Updated 4 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆43Updated 4 years ago
- Creates and sends fake meeting invite☆68Updated 4 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- My collection of self-written exploits☆24Updated 3 years ago
- Pentesting notes☆17Updated 5 months ago
- ☆54Updated 4 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Updated 4 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆26Updated 5 years ago
- Get GTFOBins info about a given exploit from the command line☆41Updated last year
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Updated 6 years ago
- offensive notes & resources☆43Updated 4 months ago
- ☆16Updated 4 years ago
- ☆47Updated 4 years ago
- ☆31Updated 4 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- A python approach to interacting with web shells.☆31Updated 4 years ago
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆9Updated 7 years ago