nop-tech / Pentesting
My Collection of exploits, reverse shells, scripts and more
☆12Updated last year
Alternatives and similar repositories for Pentesting:
Users that are interested in Pentesting are comparing it to the libraries listed below
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆23Updated 2 years ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- ☆47Updated 2 years ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆17Updated last month
- Brief writeup of post exploitation methodologies.☆17Updated last year
- ☆28Updated 3 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆67Updated last year
- ☆34Updated 3 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- A very simple python script to encode and decode PowerShell one-liners.☆24Updated 3 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- An offensive security framework for writing payloads☆15Updated 2 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆16Updated 11 months ago
- Code dump from PEN-300/OSEP updated 2022☆40Updated 2 years ago
- Crackmapexec custom scripts used in my internal pentests.☆25Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆47Updated 2 years ago
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆14Updated 4 months ago
- ☆26Updated last year
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆50Updated 3 years ago
- Most Responder's configuration power in your hand.☆44Updated last month
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆13Updated last year
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆18Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆38Updated 2 years ago
- ☆14Updated 2 years ago
- ☆29Updated last year
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 3 weeks ago
- ☆20Updated 3 years ago