mzfr / go-gtfoLinks
gtfo, now with the speed of golang
☆62Updated 5 years ago
Alternatives and similar repositories for go-gtfo
Users that are interested in go-gtfo are comparing it to the libraries listed below
Sorting:
- Alphanumeric Encoder☆25Updated 6 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- ☆36Updated 7 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 6 years ago
- Samba, NFS shares spider and grepper☆71Updated 7 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆33Updated 8 years ago
- Burp Commander written in Go☆57Updated 6 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- ☆23Updated 4 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- A tool to password spray Jenkins instances☆57Updated 6 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆46Updated 3 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- a parser + crawler for .DS_Store files exposed publically☆54Updated 2 years ago
- ☆20Updated 6 years ago
- ☆36Updated 5 years ago
- WMI Shell project : proof-of-concept of remote access to a Windows machine using only the WMI service.☆44Updated 6 years ago
- various slides and presentations I've worked on☆19Updated 5 months ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- Anonymize your hashcat formatted files for online cracking☆31Updated 10 months ago
- Writeup of CVE-2020-15906☆48Updated 4 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆39Updated 5 years ago
- Capture all RabbitMQ messages being sent through a broker.☆32Updated 4 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago