rootm0s / BustrLinks
Bustr is a utility built to discover if any new Usb, Storage, Phone or Bluetooth device has been attached/paired with system
☆10Updated 4 years ago
Alternatives and similar repositories for Bustr
Users that are interested in Bustr are comparing it to the libraries listed below
Sorting:
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆12Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 6 months ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 5 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 3 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Automated Payload Test Controller☆10Updated 7 years ago
- Undetectable Windows Payload Generation☆10Updated 7 years ago
- recover Firefox and more browsers logins☆50Updated 3 years ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆13Updated last year
- Phishing sites configured to work with Netlify form handling☆12Updated 6 years ago
- Modern Javascript keylogger with web panel☆22Updated 5 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- cool dockerfiles☆13Updated 9 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Random Tips and Writeups.☆13Updated 6 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live opera…☆18Updated 2 years ago
- module for certexfil☆15Updated 2 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 3 years ago