pentest-a2p2v / pentest-a2p2v-coreView external linksLinks
Core A2P2V functionality (command line based)
☆68May 14, 2024Updated last year
Alternatives and similar repositories for pentest-a2p2v-core
Users that are interested in pentest-a2p2v-core are comparing it to the libraries listed below
Sorting:
- ☆12Jun 29, 2021Updated 4 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Oct 20, 2018Updated 7 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- Bloodhound Portable for Windows☆53Apr 1, 2023Updated 2 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆33Aug 26, 2021Updated 4 years ago
- A vehicle network analysis and attack tool.☆117Jul 25, 2021Updated 4 years ago
- Static code analysis tool based on Elasticsearch☆129Jan 23, 2021Updated 5 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- In progress persistent download/upload/execution tool using Windows BITS.☆42Sep 13, 2021Updated 4 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆178Nov 10, 2022Updated 3 years ago
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 3 months ago
- Generate AES128/256 Kerberos keys for an AD account using a plaintext password and Python3☆81Jun 1, 2022Updated 3 years ago
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆73Dec 14, 2023Updated 2 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Cobalt Strike automation scripts collection☆12Oct 28, 2020Updated 5 years ago
- SyscallLoader☆11Sep 13, 2021Updated 4 years ago
- 支持10万人同时在线Go语言打造高并发web即时聊天(IM)应用☆12Feb 10, 2022Updated 4 years ago
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Emulate and Dissect MSF and *other* attacks☆143Feb 28, 2024Updated last year
- 一些POC、EXP☆11Nov 4, 2019Updated 6 years ago
- Bro analyzer that detects Google's QUIC protocol☆10Mar 2, 2021Updated 4 years ago
- Project to practice the basic at exploit bufferoverflow bugs.☆11Jan 28, 2017Updated 9 years ago
- ☆11Aug 10, 2021Updated 4 years ago
- JAVA指针分析☆13Jul 23, 2019Updated 6 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago
- A forensic evidence acquirer☆86Apr 14, 2021Updated 4 years ago
- A small utility to deal with malware embedded hashes.☆53Sep 21, 2023Updated 2 years ago
- MacOS C2 Framework☆85Sep 2, 2021Updated 4 years ago
- Userland API Unhooker Project☆111Jun 14, 2021Updated 4 years ago
- 个人使用的一款Web CMS指纹扫描器☆25Aug 4, 2020Updated 5 years ago
- A Computational Graph Generator for AI Compiler Fuzzing☆16May 31, 2023Updated 2 years ago
- 利用chrome扩展 dump 浏览器cookie https://saucer-man.com/information_security/787.html☆15Sep 9, 2021Updated 4 years ago
- 一个Go语言编写的可扩展的蜜罐框架☆17Feb 24, 2022Updated 3 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Pattern recognition for hosts, services, and content☆14Aug 19, 2022Updated 3 years ago
- Random scripts that I used in the CARTP course lab & final exam.☆14Feb 28, 2024Updated last year