r00t-3xp10it / resource_filesLinks
mosquito - Automating reconnaissance and brute force attacks
☆132Updated 5 years ago
Alternatives and similar repositories for resource_files
Users that are interested in resource_files are comparing it to the libraries listed below
Sorting:
- WinSpy a Windows reverse shell Backdoor creator with an Automatic IP Poisener☆208Updated 6 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆209Updated 5 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆105Updated 7 years ago
- ☆60Updated 7 years ago
- Transferring Backdoor Payloads with BMP Image Pixels☆83Updated 2 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆99Updated 3 years ago
- Automate Metasploit scanning and exploitation☆116Updated last month
- Android and iOS source for the Empire mobile app☆89Updated 6 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆142Updated 6 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134Updated 6 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆179Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆84Updated 4 years ago
- Red Login: SSH Brute-force Tools☆105Updated 7 years ago
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago
- PowerShell Empire mod to post-exploit the World!☆137Updated 6 years ago
- My collection of nmap nse modules☆64Updated 5 years ago
- pinky - The PHP mini RAT (Remote Administration Tool)☆77Updated 7 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆248Updated last year
- Autosploit = Automating Metasploit Modules.☆77Updated 6 years ago
- Arduino Rubber Ducky Framework☆107Updated 6 years ago
- Backdoor en powershell vía Telegram☆30Updated 8 years ago
- unix SSH post-exploitation 1337 tool☆142Updated 6 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆75Updated 8 years ago
- This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team memb…☆218Updated 7 years ago
- Tool made to automate tasks of pentesting.☆168Updated 5 years ago
- Simple python backdoor with Ngrok tunnel support☆206Updated last year
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆83Updated 7 years ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆56Updated last year