Code execution via Python package installation.
☆171Nov 28, 2018Updated 7 years ago
Alternatives and similar repositories for 0wned
Users that are interested in 0wned are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- python tools to assist in penetration testing☆14Jan 19, 2026Updated 4 months ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 8 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 6 years ago
- Visual Basic GUI: A Tool to Inject Keystrokes on a SSH Client via an X11 Forwarded Session☆63Mar 13, 2018Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Hacking Wordlist collections for password cracking are attached in the below files☆16Apr 5, 2018Updated 8 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆91May 8, 2018Updated 8 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Fast browser-based network discovery module☆115May 26, 2021Updated 4 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- Social Engineering Tool☆189Jul 24, 2018Updated 7 years ago
- Phishing on Twitter☆254Jun 21, 2018Updated 7 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Bash post exploitation toolkit☆750Apr 1, 2026Updated last month
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆31Mar 11, 2021Updated 5 years ago
- Exploit written in Python for CVE-2018-15473 with threading and export formats☆532Jul 12, 2024Updated last year
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Aug 12, 2020Updated 5 years ago
- ☆525Aug 11, 2023Updated 2 years ago
- A framework for stealthy domain reconnaissance☆302Oct 14, 2021Updated 4 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆26Dec 12, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 12 years ago
- a CLI for ephemeral penetration testing☆17Dec 10, 2019Updated 6 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆370Feb 23, 2024Updated 2 years ago
- A testing framework for mail security and filtering solutions.☆245Jul 24, 2023Updated 2 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Aug 11, 2021Updated 4 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- A tool to find gadgets in the iOS kernelcache.☆33Jun 20, 2018Updated 7 years ago
- Run Powershell remotely from the CLI☆11May 1, 2016Updated 10 years ago
- Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.☆42Nov 10, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Working POC of Mikrotik exploit from Vault 7 CIA Leaks☆664Sep 20, 2022Updated 3 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- Encrypted exploit delivery for the masses☆269Sep 25, 2019Updated 6 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆65Mar 4, 2026Updated 2 months ago
- Script to identify hosts vulnerable to CVE-2018-10933☆234Nov 4, 2018Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Feb 2, 2018Updated 8 years ago