s0i37 / netLinks
Useful collection of scapy-scripts and more
☆32Updated last year
Alternatives and similar repositories for net
Users that are interested in net are comparing it to the libraries listed below
Sorting:
- exfiltration/infiltration toolkit☆49Updated last year
- 1C RAS Offensive Security Tool☆28Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆150Updated last year
- linikatz is a tool to attack AD on UNIX☆155Updated 2 years ago
- Automate converting webshells into reverse shells.☆72Updated 3 weeks ago
- Finding secrets in various (non-text) popular files.☆51Updated 3 months ago
- Creates and sends fake meeting invite☆75Updated 4 years ago
- OSCP Study Guide☆42Updated 3 years ago
- ☆94Updated 5 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago
- Script to perform some hashcracking logic automagically☆80Updated 2 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆77Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Updated last year
- A collection of tools that I use in CTF's or for assessments☆107Updated last year
- ☆54Updated 2 years ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆121Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Updated 2 years ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆103Updated 5 months ago
- Easy red team phishing with Puppeteer☆133Updated 3 years ago
- POC for DLL Proxying / Hijacking☆63Updated 8 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆157Updated 11 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆54Updated 11 months ago
- A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability☆56Updated last year
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆118Updated 8 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated 2 years ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- Analyse MSI files for vulnerabilities☆143Updated last year
- About PIVOting☆13Updated 2 years ago