r00t0v3rr1d3 / armitage
Fork from @rsmudge/armitage
☆122Updated last year
Related projects: ⓘ
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆122Updated 2 months ago
- ☆112Updated 6 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆124Updated 2 months ago
- The Havoc Framework☆46Updated last year
- Just some things that have some cool uses☆103Updated 10 months ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆101Updated 8 months ago
- ☆132Updated last year
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆85Updated last month
- Open-Source Phishing Toolkit☆80Updated 3 months ago
- This project is aimed at freely providing technical guides on various hacking tools.☆93Updated 5 months ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆84Updated this week
- Collection of extra pentest tools for Kali Linux☆93Updated last year
- Simple HTTP listener for security testing☆112Updated 11 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆172Updated 2 months ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆76Updated 7 months ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆92Updated last year
- https://github.com/BC-SECURITY/Empire☆45Updated last year
- PACU - Phishing Automation & Campaigning Utility☆38Updated last year
- clone from https://sourceforge.net/projects/crunch-wordlist/☆91Updated 8 years ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆81Updated last year
- msImpersonate - User account impersonation written in pure Python3☆106Updated 2 years ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆78Updated 8 months ago
- ☆189Updated this week
- zerosum0x0's Koadic☆257Updated 2 years ago
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆89Updated last year
- A WLAN red team framework.☆141Updated 7 months ago
- IoT Camera Reconnaissance and Live Viewer☆125Updated last month
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆250Updated 3 months ago
- Red Team Guides☆134Updated 8 months ago
- ☆121Updated last year