nccgroup / autopwn
Specify targets and run sets of tools against them
☆382Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for autopwn
- ☆423Updated 7 years ago
- application server attack toolkit☆687Updated 4 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆821Updated 7 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆520Updated 7 years ago
- ☆277Updated 4 years ago
- Auto Domain Admin and Network Exploitation.☆296Updated 6 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆354Updated last year
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆569Updated 6 years ago
- Scripts that are useful for me on pen tests☆525Updated 2 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆737Updated 5 years ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆380Updated 2 years ago
- ☆596Updated last month
- Frontpage and Sharepoint fingerprinting and attack tool.☆277Updated 3 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆760Updated 4 years ago
- A tool for security professionals to access and interact with remote Microsoft Windows based systems.☆429Updated 7 years ago
- Scans for accessibility tools backdoors via RDP☆328Updated 6 years ago
- Post Exploitation Wiki☆514Updated 4 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆437Updated 7 years ago
- Automated Responder/secretsdump.py cracking☆181Updated 8 years ago
- ☆235Updated 5 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,203Updated 4 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆345Updated 3 months ago
- Automates some pentest jobs via nmap xml file☆322Updated 6 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆486Updated 3 years ago
- Plugins for Metasploit Framework☆426Updated 5 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆333Updated last year
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆156Updated 8 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆887Updated 4 years ago
- Metasploit AV Evasion Tool☆257Updated 8 years ago