nccgroup / gitpwnd
GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines
☆146Updated 2 years ago
Alternatives and similar repositories for gitpwnd:
Users that are interested in gitpwnd are comparing it to the libraries listed below
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆192Updated 7 years ago
- ☆122Updated 7 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 7 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website☆138Updated 5 years ago
- ☆92Updated 6 years ago
- Exfiltrate files via DNS☆96Updated 11 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Testing/collecting some container breakouts☆94Updated 5 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 8 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Updated 10 years ago
- Common Findings Database☆100Updated 5 years ago
- Rogue AP killer☆89Updated 7 years ago
- Decept Network Protocol Proxy☆276Updated 2 years ago
- ☆61Updated 7 years ago
- ☆90Updated 3 months ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- An extensible honeypot framework☆93Updated 2 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- penetration testing scripts☆136Updated 5 years ago
- a CLI for ephemeral penetration testing☆13Updated 5 years ago
- A static-code-analysis tool for performing security-focused code reviews. It enables an auditor to swiftly map the attack-surface of a la…☆139Updated 10 months ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆141Updated 7 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆99Updated last year
- ☆150Updated last year
- ☆89Updated 7 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 6 years ago