operatorequals / wormnestLinks
A Web Server to hide stuff
☆22Updated 3 years ago
Alternatives and similar repositories for wormnest
Users that are interested in wormnest are comparing it to the libraries listed below
Sorting:
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Updated 4 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- Ansible scripts to build an attack box☆23Updated 6 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 5 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 5 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- ☆36Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- ☆11Updated 6 years ago
- ☆25Updated 4 years ago
- Generic malicious browser check written in C#☆13Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Automated deployment and configuration of a Mythic server using Terraform and Ansible☆9Updated 2 years ago
- Event Data Collector☆37Updated last month
- Daily TLD health report generated using RIPE's DNSCheck against all existing TLDs.☆18Updated 8 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- Screenshot Shenanigans☆26Updated 7 years ago
- Protect your servers with a secret header☆29Updated 4 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Updated 5 years ago
- Red Team Automation tool powered by go and terraform☆30Updated 4 years ago
- Fake SMB and SAMR data☆11Updated 5 years ago
- Walking the PEB in VBA☆23Updated 5 years ago
- ☆12Updated 8 years ago
- Assists in mass exportation of Nessus scans☆21Updated 7 years ago
- Web application that lets you test if your domain is vulnerable to email spoofing☆35Updated 6 years ago
- Helpful operator notes and techniques in actionable form☆17Updated last year
- Zone transfers for rwhois☆20Updated 6 years ago