mosquito - Automating reconnaissance and brute force attacks
☆131Dec 9, 2019Updated 6 years ago
Alternatives and similar repositories for resource_files
Users that are interested in resource_files are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.☆15Jul 19, 2020Updated 5 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Oct 8, 2020Updated 5 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Nov 25, 2016Updated 9 years ago
- Red Teaming Tactics and Techniques☆11Sep 11, 2020Updated 5 years ago
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Oct 2, 2016Updated 9 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49May 16, 2017Updated 8 years ago
- This repo contains Axis web shells☆18Jun 15, 2019Updated 6 years ago
- Hack Cameras CCTV FREE☆17Aug 22, 2021Updated 4 years ago
- collection of articles/books about programing☆588Dec 20, 2023Updated 2 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Nov 25, 2016Updated 9 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Jul 4, 2020Updated 5 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆876Dec 28, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- My collection of nmap nse modules☆64Oct 19, 2019Updated 6 years ago
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defender☆37Sep 28, 2019Updated 6 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Encrypted Shellcode Loader Generator☆22Jan 29, 2019Updated 7 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆505Mar 11, 2024Updated 2 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Jul 6, 2022Updated 3 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆94Feb 24, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Transform your batch (bat) script into one binary.exe☆53Feb 11, 2024Updated 2 years ago
- venom - C2 shellcode generator/compiler/handler☆1,943Dec 9, 2023Updated 2 years ago
- ☆17Mar 21, 2019Updated 7 years ago
- Loader and RunPE file executer☆19Jun 12, 2019Updated 6 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- Self defense post module for metasploit☆17Aug 30, 2019Updated 6 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆14Sep 22, 2019Updated 6 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Sep 9, 2022Updated 3 years ago
- Network Pivoting Toolkit☆458Aug 26, 2023Updated 2 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆542Apr 14, 2021Updated 4 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆294Feb 28, 2018Updated 8 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 4 years ago