redcode-labs / SNOWCRASHLinks
A polyglot payload generator
☆242Updated 3 years ago
Alternatives and similar repositories for SNOWCRASH
Users that are interested in SNOWCRASH are comparing it to the libraries listed below
Sorting:
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 5 years ago
- A Linux enumeration script for Hack The Box☆191Updated 6 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 3 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆214Updated 5 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆226Updated 4 years ago
- ☆156Updated 2 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆502Updated 4 months ago
- Windows active user credential phishing tool☆283Updated 5 years ago
- Basic C2 Server☆193Updated 4 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Updated last year
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆144Updated 4 years ago
- A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python☆200Updated 4 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 4 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆291Updated 4 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆146Updated 2 years ago
- Network Pivoting Toolkit☆457Updated 2 years ago
- Red Team engagement platform with the goal of unifying offensive tools behind a simple UI☆301Updated last year
- Zero Infrastructure Password Cracking☆413Updated last year
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆344Updated 7 years ago
- An open source swiss army knife for arbitrary communication over application protocols☆245Updated 5 years ago
- Open-Source Collection of Social Engineering Pretexts☆142Updated 2 years ago
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆178Updated 5 years ago
- Lure - User Recon Automation for GoPhish☆167Updated 2 years ago
- Simple script to generate commands to achieve reverse shells.☆120Updated 5 years ago
- Some Pentest Tools. Install and keep up to date some pentesting tools. I used this to pass my OSCP exam.☆67Updated 4 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆135Updated 2 weeks ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆181Updated 2 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year