Code execution via Python package installation.
☆170Nov 28, 2018Updated 7 years ago
Alternatives and similar repositories for 0wned
Users that are interested in 0wned are comparing it to the libraries listed below
Sorting:
- python tools to assist in penetration testing☆14Jan 19, 2026Updated 2 months ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 8 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- Visual Basic GUI: A Tool to Inject Keystrokes on a SSH Client via an X11 Forwarded Session☆63Mar 13, 2018Updated 8 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Apr 5, 2018Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Fast browser-based network discovery module☆115May 26, 2021Updated 4 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- Phishing on Twitter☆251Jun 21, 2018Updated 7 years ago
- Social Engineering Tool☆189Jul 24, 2018Updated 7 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Bash post exploitation toolkit☆746Mar 8, 2026Updated last week
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆31Mar 11, 2021Updated 5 years ago
- Exploit written in Python for CVE-2018-15473 with threading and export formats☆532Jul 12, 2024Updated last year
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆471Nov 14, 2019Updated 6 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Aug 12, 2020Updated 5 years ago
- ☆523Aug 11, 2023Updated 2 years ago
- A framework for stealthy domain reconnaissance☆301Oct 14, 2021Updated 4 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆26Dec 12, 2018Updated 7 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- a CLI for ephemeral penetration testing☆16Dec 10, 2019Updated 6 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆372Feb 23, 2024Updated 2 years ago
- A testing framework for mail security and filtering solutions.☆245Jul 24, 2023Updated 2 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Aug 11, 2021Updated 4 years ago
- A tool to find gadgets in the iOS kernelcache.☆33Jun 20, 2018Updated 7 years ago
- Run Powershell remotely from the CLI☆11May 1, 2016Updated 9 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Working POC of Mikrotik exploit from Vault 7 CIA Leaks☆662Sep 20, 2022Updated 3 years ago
- Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.☆43Nov 10, 2018Updated 7 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- Encrypted exploit delivery for the masses☆270Sep 25, 2019Updated 6 years ago
- Script to identify hosts vulnerable to CVE-2018-10933☆233Nov 4, 2018Updated 7 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆65Mar 4, 2026Updated 2 weeks ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago