pry0cc / crobat-clientLinks
A Go client for crobat
☆24Updated 5 years ago
Alternatives and similar repositories for crobat-client
Users that are interested in crobat-client are comparing it to the libraries listed below
Sorting:
- Burp with Friends☆103Updated 2 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆62Updated 2 years ago
- An epic web shell☆85Updated 2 months ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆78Updated 4 years ago
- The Cloud Blocker☆107Updated 6 months ago
- JIRA Secure Attachment Looter☆70Updated 5 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- A git submodule list containing all the tools repo's you'll ever need.☆27Updated 6 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆81Updated 5 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆50Updated 6 years ago
- Burp Extension for AWS Signing☆89Updated 7 months ago
- Zone transfers for rwhois☆20Updated 6 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 6 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆111Updated 5 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- SNIcat☆127Updated 4 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- OAuth Security Cheatsheet☆40Updated 11 years ago
- Golang-based subdomain miner leveraging certificate transparency logs☆76Updated 2 years ago
- A tool to evaluate Content Security Policies.☆72Updated 5 years ago
- Various XSL templates to manipulate data from NMap XML reports☆27Updated 6 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- A Metasploit auto auxiliary script☆104Updated 2 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- Simple S3 Bucket Testing Software☆31Updated 3 years ago