n3m351d4 / IPv6-Attacks-and-Covert-Channels
☆15Updated 4 years ago
Alternatives and similar repositories for IPv6-Attacks-and-Covert-Channels:
Users that are interested in IPv6-Attacks-and-Covert-Channels are comparing it to the libraries listed below
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- module for certexfil☆15Updated 2 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- Python libraries for Windows system coding☆14Updated 4 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆10Updated 7 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆22Updated 6 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆13Updated 4 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- Format string exploit generation☆10Updated 9 years ago
- Leveraging CVE-2018-19788 without root shells☆18Updated 6 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Cisco IOS Exploit Framework☆21Updated 5 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 6 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆22Updated 7 years ago
- Proof of concept demo for a tool that listens for keywords, and records audio to a file.☆12Updated 7 years ago
- autopwn rdp servers☆8Updated 6 years ago
- Env Scraper for Linux Post Exploitation☆9Updated 7 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 5 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago