r1vs3c / searchbinsLinks
Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured systems.
☆48Updated last year
Alternatives and similar repositories for searchbins
Users that are interested in searchbins are comparing it to the libraries listed below
Sorting:
- Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.☆34Updated last year
- wp-config-scan☆80Updated 2 years ago
- Hardware Hacking ES Comunidad☆116Updated last year
- Local File Inclusion To Remote Command Execution (PoC)☆51Updated 2 years ago
- Personal CheatSheet used for the exam made with Obsidian, download the repo and use the resources within Obsidian for a better experience…☆45Updated 2 years ago
- A comprehensive automation script for penetration testing and reconnaissance.☆42Updated last year
- Herramienta donde puedes practicar las vulnerabilidades web más conocidas. Email: info@webvulnlab.org☆61Updated last month
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆105Updated last week
- Máquina virtual para investigaciones en fuentes abiertas OSINT☆18Updated 11 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆63Updated 8 months ago
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆30Updated 10 months ago
- Herramienta en PowerShell ideal para desplegar tu propio entorno AD vulnerable de forma automatizada.☆101Updated last year
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆58Updated last year
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆28Updated last year
- Automatic reverse/bind shell generator cheat sheet.☆34Updated 2 years ago
- Blog personal sobre resolución de CTF's, artículos y demás cosas locas en ciberseguridad :)☆16Updated last month
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆16Updated 8 months ago
- Herramienta para detectar correos de phishing mediante análisis DKIM, SPF, y WHOIS☆32Updated last year
- Msfvenom Advanced Obfuscated Payload Builder.☆25Updated 3 months ago
- Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)☆14Updated 4 years ago
- BaldHead is a modular and interactive Active Directory (AD) attack framework built for red teamers and security testers. It automates enu…☆105Updated 3 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- Templates for submissions☆82Updated last month
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆22Updated last year
- ☆44Updated last year
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆125Updated last year
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆70Updated 2 years ago
- ☆44Updated 3 years ago
- Scripts for offensive security☆158Updated 3 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated last year