random-robbie / slurpLinks
Enumerate S3 buckets via certstream, domain, or keywords
☆15Updated 7 years ago
Alternatives and similar repositories for slurp
Users that are interested in slurp are comparing it to the libraries listed below
Sorting:
- ☆1Updated 6 years ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- A collection of scripts used to interact with the Burp Rest API☆52Updated 6 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- POC for utilizing wikipedia API for Command and Control☆29Updated 2 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- Docker Version of Aquatone☆14Updated 7 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Updated 6 years ago
- ☆38Updated 5 years ago
- Socks5 server over Websockets☆40Updated 6 years ago
- Pivot into private VPC networks using a VPN connection☆43Updated 5 years ago
- Collection of IronPython scripts and executables for penetration testing☆55Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 10 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆32Updated last year
- ☆29Updated 7 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆32Updated 9 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 8 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- Rex library for dealing with Powershell Scripts☆53Updated 2 months ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- ☆44Updated 9 years ago
- EXIF-based command and control PoC☆16Updated 5 years ago
- Scans an internal network using massscan and nmap☆20Updated last year
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Nashorn Post Exploitation☆32Updated 7 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Updated 6 years ago