mrschyte / pentestkoalaView external linksLinks
Modified dropbear server which acts as a client and allows authless login
☆126Aug 27, 2018Updated 7 years ago
Alternatives and similar repositories for pentestkoala
Users that are interested in pentestkoala are comparing it to the libraries listed below
Sorting:
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- A TCP proxy over named pipes. Originally created for maintaining a meterpreter session over 445 for less network alarms.☆242Sep 13, 2021Updated 4 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Nov 6, 2016Updated 9 years ago
- Open Source Office Malware Generation & Polymorphic Engine for Red Teams and QA testing☆95Apr 5, 2017Updated 8 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Feb 5, 2016Updated 10 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 3 years ago
- Powershell C2 Server and Implants☆574Nov 11, 2019Updated 6 years ago
- PowerShell to Slack C2☆109May 31, 2018Updated 7 years ago
- Fucking Search Engines Scraper - python library to scrap url's from search engines☆49Sep 6, 2017Updated 8 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆304Oct 27, 2017Updated 8 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- A collection of post-exploitation tools for network red teaming.☆139Dec 7, 2018Updated 7 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆255Mar 30, 2017Updated 8 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆177Dec 1, 2022Updated 3 years ago
- Liniaal - A communication extension to Ruler☆99Aug 22, 2018Updated 7 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆322Jun 5, 2017Updated 8 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,111Nov 3, 2017Updated 8 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- A payload stager using PowerShell☆183Dec 15, 2019Updated 6 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Dec 11, 2015Updated 10 years ago
- ☆41Jul 4, 2018Updated 7 years ago
- Testing/collecting some container breakouts☆94Jul 22, 2019Updated 6 years ago
- Nameserver DNS poisoning attacks made easy☆525Feb 26, 2017Updated 8 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆56Dec 3, 2016Updated 9 years ago
- Provides a simple Python based proxy for running DNS over HTTPS to Google's DNS over HTTPS service.☆39Mar 10, 2025Updated 11 months ago
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- PowerShell Remote Download Cradle Generator & Obfuscator☆853Mar 23, 2018Updated 7 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆526Apr 14, 2023Updated 2 years ago
- A command line tool for creating malicious outlook rules☆165Dec 11, 2018Updated 7 years ago
- Encode powershell payload into bat files☆155Feb 1, 2018Updated 8 years ago
- splunk_pentest_app☆50Apr 22, 2016Updated 9 years ago