r1vs3c / searchbins
Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured systems.
☆43Updated 8 months ago
Alternatives and similar repositories for searchbins:
Users that are interested in searchbins are comparing it to the libraries listed below
- Herramienta en PowerShell ideal para desplegar tu propio entorno AD vulnerable de forma automatizada.☆98Updated last year
- Automatic reverse/bind shell generator cheat sheet.☆35Updated 2 years ago
- Msfvenom Advanced Obfuscated Payload Builder.☆24Updated last month
- Local File Inclusion To Remote Command Execution (PoC)☆48Updated last year
- Herramienta donde puedes practicar las vulnerabilidades web más conocidas. Email: info@webvulnlab.org☆61Updated 2 weeks ago
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆15Updated 3 months ago
- Proxmark guide☆14Updated last month
- Personal CheatSheet used for the exam made with Obsidian, download the repo and use the resources within Obsidian for a better experience…☆45Updated 2 years ago
- wp-config-scan☆76Updated last year
- Máquina virtual para investigaciones en fuentes abiertas OSINT☆17Updated 5 months ago
- Herramienta para detectar correos de phishing mediante análisis DKIM, SPF, y WHOIS☆25Updated 7 months ago
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆21Updated 7 months ago
- ☆11Updated last month
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆48Updated 3 months ago
- Blog personal sobre resolución de CTF's, artículos y demás cosas locas en ciberseguridad :)☆15Updated last month
- Exploits for some linux binaries :)☆36Updated 2 months ago
- Hardware Hacking ES Comunidad☆90Updated 7 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- uCVE is a tool written in GO that allows to extract CVE's related to a specific software and version, obtaining a report in HTML format w…☆35Updated last year
- Exploits for some windows binaries :)☆46Updated 2 months ago
- Herramienta ideal para obtener una Fully Shell interactiva vía HTTP, sin necesidad de hacer Reverse Shell.☆97Updated last year
- Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)☆13Updated 4 years ago
- Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.☆26Updated 6 months ago
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆51Updated last year
- A comprehensive automation script for penetration testing and reconnaissance.☆35Updated 8 months ago
- Tool made to inject malicious code inside a legitimate apk in order to gain access to the infected device.☆15Updated 8 months ago
- ☆14Updated last year
- Webscrapper written in python3 to show gtfobins in a terminal.☆47Updated 2 years ago
- Enhance Your Active Directory Spraying with User Information.☆16Updated last month
- Pasos necesarios para obtener una reverse shell explotando la vulnerabilidad de winrar CVE-2023-38831 en versiones anteriores a 6.23.☆22Updated last year