GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines
☆146Feb 2, 2023Updated 3 years ago
Alternatives and similar repositories for gitpwnd
Users that are interested in gitpwnd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Virtual scenario for Network Penetration Testing☆14Mar 19, 2017Updated 9 years ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆54Mar 11, 2024Updated 2 years ago
- Improved decoder for Burp Suite☆138Aug 30, 2021Updated 4 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- Burp Suite extension to perform Kerberos authentication☆106Jun 28, 2024Updated last year
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Aug 13, 2018Updated 7 years ago
- Remotely accessible Tor hidden service deployment suite☆24Dec 7, 2018Updated 7 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- Fucking Search Engines Scraper - python library to scrap url's from search engines☆49Sep 6, 2017Updated 8 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆366Nov 19, 2024Updated last year
- ☆14Aug 14, 2025Updated 7 months ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,214Sep 14, 2020Updated 5 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- Undetectable Windows Payload Generation☆1,609Nov 8, 2022Updated 3 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- Quick scan to find live hosts on the network/across networks☆48Jul 4, 2014Updated 11 years ago
- Main repository to pull all NCC Group Cisco ASA-related tool projects.☆233Aug 24, 2018Updated 7 years ago
- Collection of information security policies.☆29Apr 20, 2017Updated 8 years ago
- Hacking Toolkit☆974Dec 30, 2025Updated 2 months ago
- Linux-KVM with rVMI extensions☆22Aug 28, 2017Updated 8 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- some pocs for antivirus evasion☆129Aug 28, 2023Updated 2 years ago
- Tools for NTDS.dit☆17Apr 26, 2018Updated 7 years ago
- ☆16Aug 11, 2017Updated 8 years ago
- HTA encryption tool for RedTeams☆1,422Nov 9, 2022Updated 3 years ago
- Collection of social engineering payloads☆300Oct 19, 2017Updated 8 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆308Oct 27, 2017Updated 8 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆176Dec 1, 2022Updated 3 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆621Oct 6, 2025Updated 5 months ago
- An automated SMB relay exploitation script.☆153Oct 11, 2016Updated 9 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago