pentestfunctions / WSL-SeamlessLinks
Seamless mode integration for WSL
☆11Updated last year
Alternatives and similar repositories for WSL-Seamless
Users that are interested in WSL-Seamless are comparing it to the libraries listed below
Sorting:
- Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert En…☆518Updated last year
- Bookmarklet to find endpoints easily with one click☆58Updated last year
- ☆313Updated last year
- Remake of CVE-2020-9484 by Pentestical☆20Updated 10 months ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆382Updated this week
- My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.☆128Updated 3 weeks ago
- Quick commands for pentesting/No typing!☆16Updated last year
- Quick scripts I developed to streamline OSCP tasks☆145Updated last month
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆273Updated last year
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆139Updated 4 months ago
- NetProbe: Network Probe☆161Updated 9 months ago
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆16Updated 6 months ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆200Updated 3 weeks ago
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆73Updated last year
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆31Updated 3 weeks ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆253Updated 3 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆392Updated 6 months ago
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆322Updated 2 months ago
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆163Updated last year
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆87Updated 11 months ago
- Internal Network Penetration Test Playbook☆16Updated 3 years ago
- Nmap Dashboard Mini Project☆605Updated last year
- Indicators of Compromise (IOCs) from malware or suspicious network traffic☆46Updated this week
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆308Updated 2 months ago
- Sticky notes for pentesting, bug bounty, CTF.☆708Updated 3 months ago
- Autofill Phishing☆72Updated 7 months ago
- Modular malware framework to build custom payloads, designed for advanced adversary simulation and malware research☆190Updated this week
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!☆47Updated last year
- Pentesting automation platform that combines hacking tools to complete assessments☆470Updated 2 weeks ago
- A blind SQL injection brute forcer☆110Updated 2 months ago