ps1337 / haxxor-toolsLinks
Pentesting resources
☆23Updated 6 years ago
Alternatives and similar repositories for haxxor-tools
Users that are interested in haxxor-tools are comparing it to the libraries listed below
Sorting:
- Notes on Active Directory analysis and exploitation☆11Updated 6 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆39Updated 5 years ago
- Import Nmap scans to Cherrytree☆37Updated 3 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Updated 7 years ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆51Updated 8 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 6 years ago
- Rogue Access Point Detector☆37Updated last year
- Skills To Improve Before Heading to OSCP☆15Updated 8 years ago
- Setup Kali XFCE version with some hi-dpi friendly style☆32Updated 6 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- A dockerized, improved version of the Impacket smbserver.py☆40Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆34Updated 6 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- Wireless Pentesting Device☆24Updated 5 years ago
- Effectively search the Exploit-DB☆16Updated 5 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆71Updated 2 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 7 years ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- Serpico-NG https://github.com/LUTECH-TMS-CERT/EHAT-NG☆11Updated 7 years ago
- Clean public password dump files and store in ELK☆38Updated 7 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆34Updated 5 years ago
- buffer overflow examples☆22Updated 7 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 7 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 3 years ago
- An epic web shell☆85Updated 4 months ago
- A quick reference script that can easily display reverse shells for different languages.☆20Updated 5 years ago
- Simple Karma Attack☆69Updated 5 years ago