rushter / blog_codeLinks
Code snippets from my blog
☆29Updated 3 months ago
Alternatives and similar repositories for blog_code
Users that are interested in blog_code are comparing it to the libraries listed below
Sorting:
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- API testing tool written with Python☆56Updated 8 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 6 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆94Updated 7 years ago
- LetMeOutOfYour.net Resources☆21Updated 5 years ago
- An easy to grep dump of the NVD database showing only; CVE-ID, CVSS Risk Score, and Summary.☆56Updated 3 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆10Updated 4 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Screenshot Shenanigans☆26Updated 8 years ago
- A Pythonic wrapper to MassDNS☆24Updated 7 years ago
- Pivot into private VPC networks using a VPN connection☆43Updated 6 years ago
- POC for utilizing wikipedia API for Command and Control☆29Updated 3 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 6 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Updated 5 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- Scan for and exploit Consul agents☆39Updated 6 years ago
- ☆37Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 3 years ago
- Fake SMB and SAMR data☆11Updated 6 years ago
- bash poc scripts to exploit open fpm ports☆59Updated 6 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Updated 11 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- The Cloud Blocker☆108Updated 11 months ago
- introduction to distributed scanning using vultr☆10Updated 8 years ago
- Obfuscates a Python Script and the accompanying Shellcode.☆57Updated 6 years ago
- SSH spreading made easy for red teams in a hurry☆57Updated 2 years ago