Tool orchestrator. Specify targets and run sets of tools against them.
☆19Jun 3, 2016Updated 9 years ago
Alternatives and similar repositories for torc
Users that are interested in torc are comparing it to the libraries listed below
Sorting:
- A collection off SVG for Home Assistant☆13Apr 25, 2025Updated 10 months ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Ansible playbooks to facilitate redteam stuff☆14Aug 2, 2016Updated 9 years ago
- GUI program to generate windows and SQL audit files for nessus☆14Jun 23, 2017Updated 8 years ago
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- ☆23Feb 16, 2016Updated 10 years ago
- ☆29Apr 20, 2018Updated 7 years ago
- ☆10May 8, 2016Updated 9 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- ☆12Aug 29, 2025Updated 6 months ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- LFI scan, exploit tool☆13Nov 19, 2014Updated 11 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Sep 17, 2015Updated 10 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Jun 11, 2024Updated last year
- Store Burp data and collaborate via git☆53Oct 31, 2019Updated 6 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆106May 30, 2017Updated 8 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49May 16, 2017Updated 8 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- PSIKOTIK TSO User Enumerator☆17Aug 24, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- ☆61Mar 16, 2018Updated 7 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17May 16, 2018Updated 7 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 10 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Aug 18, 2020Updated 5 years ago
- ☆20Jan 18, 2024Updated 2 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago