nccgroup / autopwnLinks
Specify targets and run sets of tools against them
☆389Updated 6 years ago
Alternatives and similar repositories for autopwn
Users that are interested in autopwn are comparing it to the libraries listed below
Sorting:
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆524Updated 8 years ago
- A tool for security professionals to access and interact with remote Microsoft Windows based systems.☆432Updated 7 years ago
- application server attack toolkit☆685Updated 5 years ago
- ☆425Updated 7 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆356Updated 2 years ago
- SpeedPhishing Framework☆444Updated 5 years ago
- Automated digital reconnaissance☆197Updated 2 years ago
- Scripts that are useful for me on pen tests☆530Updated 2 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Updated 4 years ago
- A webshell framework for penetration testers.☆298Updated last year
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆493Updated 3 years ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆385Updated 2 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Updated 8 years ago
- ☆606Updated 7 months ago
- PwnWiki - The notes section of the pentesters mind.☆562Updated 6 years ago
- Github for the scripts utilised during Penetration test☆235Updated 7 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆253Updated 8 years ago
- ☆241Updated 5 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,215Updated 4 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆333Updated 2 years ago
- SpiderLabs shared Nmap Tools☆229Updated 4 years ago
- A ton of helpful tools☆336Updated 3 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆383Updated 5 years ago
- This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.☆678Updated 8 years ago
- Auto Domain Admin and Network Exploitation.☆299Updated 7 years ago
- ☆280Updated 5 years ago
- ☆636Updated 8 months ago
- Metasploit AV Evasion Tool☆260Updated 9 years ago