GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines
☆145Feb 2, 2023Updated 3 years ago
Alternatives and similar repositories for gitpwnd
Users that are interested in gitpwnd are comparing it to the libraries listed below
Sorting:
- Virtual scenario for Network Penetration Testing☆14Mar 19, 2017Updated 8 years ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆54Mar 11, 2024Updated last year
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Improved decoder for Burp Suite☆138Aug 30, 2021Updated 4 years ago
- Remotely accessible Tor hidden service deployment suite☆24Dec 7, 2018Updated 7 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Fucking Search Engines Scraper - python library to scrap url's from search engines☆49Sep 6, 2017Updated 8 years ago
- Burp Suite extension to perform Kerberos authentication☆106Jun 28, 2024Updated last year
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆306Oct 27, 2017Updated 8 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Aug 13, 2018Updated 7 years ago
- Post Exploitation Wiki☆524Dec 18, 2019Updated 6 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Collection of social engineering payloads☆300Oct 19, 2017Updated 8 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆363Nov 19, 2024Updated last year
- An automated SMB relay exploitation script.☆153Oct 11, 2016Updated 9 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- Main repository to pull all NCC Group Cisco ASA-related tool projects.☆233Aug 24, 2018Updated 7 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Undetectable Windows Payload Generation☆1,607Nov 8, 2022Updated 3 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆168Jun 8, 2017Updated 8 years ago
- some pocs for antivirus evasion☆129Aug 28, 2023Updated 2 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Mar 8, 2019Updated 6 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- ☆524Aug 11, 2023Updated 2 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- Python OSINT Tool to retrieve information from Skype☆76Oct 12, 2015Updated 10 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- Quick scan to find live hosts on the network/across networks☆48Jul 4, 2014Updated 11 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆138Dec 22, 2017Updated 8 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆176Dec 1, 2022Updated 3 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆629Oct 16, 2018Updated 7 years ago
- A tool to generate media files with malicious metadata☆129Feb 2, 2019Updated 7 years ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago