r1vs3c / searchbins
Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured systems.
☆43Updated 9 months ago
Alternatives and similar repositories for searchbins:
Users that are interested in searchbins are comparing it to the libraries listed below
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆16Updated 3 months ago
- wp-config-scan☆79Updated last year
- Automatic reverse/bind shell generator cheat sheet.☆35Updated 2 years ago
- Herramienta donde puedes practicar las vulnerabilidades web más conocidas. Email: info@webvulnlab.org☆61Updated this week
- Herramienta en PowerShell ideal para desplegar tu propio entorno AD vulnerable de forma automatizada.☆98Updated last year
- Msfvenom Advanced Obfuscated Payload Builder.☆24Updated 2 months ago
- A comprehensive automation script for penetration testing and reconnaissance.☆35Updated 8 months ago
- Personal CheatSheet used for the exam made with Obsidian, download the repo and use the resources within Obsidian for a better experience…☆45Updated 2 years ago
- Máquina virtual para investigaciones en fuentes abiertas OSINT☆18Updated 6 months ago
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆26Updated 5 months ago
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆22Updated 8 months ago
- PenKraken, herramienta de automatizacion de hacking Etico / Pentesting☆10Updated 10 months ago
- Local File Inclusion To Remote Command Execution (PoC)☆48Updated 2 years ago
- Herramienta para detectar correos de phishing mediante análisis DKIM, SPF, y WHOIS☆28Updated 8 months ago
- Proxmark guide☆14Updated 2 months ago
- Herramienta para hacking wifi con múltiples opciones.☆32Updated 8 months ago
- Blog personal sobre resolución de CTF's, artículos y demás cosas locas en ciberseguridad :)☆16Updated 2 weeks ago
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆52Updated last year
- Bash script that perform all the setup for BSPWM installation, including polybar, picom, pywal,nvchad, with multiple color schemes and a …☆29Updated 4 months ago
- Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)☆13Updated 4 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆51Updated 3 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆167Updated 10 months ago
- Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.☆29Updated 6 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- Enhance Your Active Directory Spraying with User Information.☆16Updated 2 months ago
- Tor Relay Searcher is a Python script that uses the Onionoo TOR API to filter by relay tags.☆9Updated 10 months ago
- Tool for automate bug hunting process 🔍 --> 🍭☆38Updated 8 months ago
- ☆11Updated 2 months ago
- Local File Inclusion Enumeration (PoC)☆60Updated 9 months ago
- Tool made to inject malicious code inside a legitimate apk in order to gain access to the infected device.☆15Updated 8 months ago