needmorecowbell / jumperLinks
Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)
☆13Updated 7 years ago
Alternatives and similar repositories for jumper
Users that are interested in jumper are comparing it to the libraries listed below
Sorting:
- A Tool for cross-platform System Enumeration☆12Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- ANWI - All New Wireless IDS☆28Updated last month
- ☆12Updated 8 years ago
- Automatically parses and attacks BloodHound-generated graphs☆42Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Enumerate subdomains through Virustotal☆32Updated 6 years ago
- Recursively searches a directory for any file containing a specified string☆48Updated 10 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Updated 6 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- My pentest cheat sheet☆15Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated last year
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Updated 11 years ago
- ☆46Updated 8 years ago
- ☆17Updated 8 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 8 years ago
- Social Engineering Abusing Google App Scripts☆24Updated 8 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 8 years ago
- One-off scripts☆52Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆40Updated 7 years ago
- Search the ExploitDB with a little more control☆22Updated 8 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- ☆22Updated 9 years ago
- ☆26Updated 5 years ago
- Lair Framework dockerized.☆38Updated 4 years ago