proxyanon / BatSploit
Exploitation Tool For Windows Using Batch and Powershell
β21Updated 2 months ago
Alternatives and similar repositories for BatSploit:
Users that are interested in BatSploit are comparing it to the libraries listed below
- Exploit XXE Out-Of-Band Vulnerability Easilyβ15Updated 8 years ago
- π‘ A security research tool with shodan integrationβ25Updated 6 years ago
- Gmail Knockerβ21Updated 7 years ago
- Converts a command to a base64 powershell compatible stringβ25Updated 10 years ago
- Multithreaded DNS recursive host brute-force toolβ13Updated 9 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.β17Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generatorβ13Updated 8 years ago
- A modular pentesting framework implemented in Cβ14Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphsβ41Updated 6 years ago
- Collection of Nmap scriptsβ10Updated 9 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.β24Updated 8 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :Vβ17Updated 5 years ago
- Tool for automation of GUI-based testing.β15Updated 10 years ago
- Techniques that i have used to evade anti-virus during pen tests.β13Updated 6 years ago
- python code to connect to mail servers and pillage the data contained withinβ9Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Frameworkβ48Updated 5 years ago
- Commands to perform various activities related to penetration testing and red teamingβ19Updated 5 years ago
- PHP Phishing Frameworkβ28Updated 11 years ago
- Random stuffβ16Updated 6 years ago
- Open-source Exploiting Frameworkβ29Updated 7 years ago
- Software exploitation training materialβ15Updated 7 years ago
- Multi source CVE/exploit parser.β27Updated 7 years ago
- Specify targets and run sets of tools against themβ11Updated 9 years ago
- A botnet (C&C) framework that create in bash and using crontab for periodic executeβ10Updated 7 years ago
- Impersonate Logged In Accounts & Execute Commandsβ35Updated 10 years ago
- An AV evasion technique using multibyte xor encoding of shellcodeβ8Updated 8 years ago
- Local enumeration and exploitation framework.β18Updated 7 years ago
- 0x88 exploit pack Decodedβ28Updated 10 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a greaβ¦β22Updated 6 years ago
- Invoke remote powershell scripts in memory of compromised hosts.β10Updated 10 years ago