OpenCV based IDN option generator PoC
☆39Jan 18, 2017Updated 9 years ago
Alternatives and similar repositories for eyephish
Users that are interested in eyephish are comparing it to the libraries listed below
Sorting:
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- Webshell for Razor Syntax (C#)☆19May 5, 2017Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- IPSec testing tool☆19Oct 19, 2024Updated last year
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Dec 29, 2016Updated 9 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆21May 11, 2017Updated 8 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Dec 24, 2014Updated 11 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆170Mar 7, 2018Updated 8 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Aug 7, 2016Updated 9 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Feb 5, 2016Updated 10 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- IR-Tools - PowerShell tools for IR☆130Jul 10, 2017Updated 8 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Feb 25, 2023Updated 3 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- ☆19May 31, 2017Updated 8 years ago
- Dig through Git commits and logs☆21Jan 8, 2019Updated 7 years ago
- ☆36Mar 11, 2019Updated 7 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- Code generator for binary parsing☆20Feb 1, 2020Updated 6 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- Rogue Synergy server☆18Mar 8, 2017Updated 9 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Jun 25, 2019Updated 6 years ago
- This is a compilation of various shells that I had found in the wild.☆15May 30, 2013Updated 12 years ago
- ☆242Jun 15, 2024Updated last year
- SSH Based Remote Administration Tool☆103Jul 9, 2015Updated 10 years ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago