s0i37 / net
Useful collection of scapy-scripts and more
☆27Updated 9 months ago
Alternatives and similar repositories for net:
Users that are interested in net are comparing it to the libraries listed below
- exfiltration/infiltration toolkit☆44Updated 4 months ago
- Finding secrets in various (non-text) popular files.☆24Updated 2 months ago
- 1C RAS Offensive Security Tool☆25Updated last year
- Privileger is a tool to work with Windows Privileges☆136Updated 2 years ago
- karma WiFi attack implementation☆48Updated 5 months ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆32Updated 3 years ago
- POC for DLL Proxying / Hijacking☆60Updated 3 weeks ago
- Cisco IOS Security Inspector☆22Updated this week
- An asynchronous TCP and UDP port scanner developed by the late Jack C. Louis.☆34Updated 10 years ago
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- cve-2021-42013.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.50☆24Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- GitHub CVE Repository Hunt☆18Updated 8 months ago
- C2 Automation using Linode☆80Updated 2 years ago
- Creates and sends fake meeting invite☆58Updated 3 years ago
- Presentaciones de congresos☆52Updated 9 months ago
- My dotfiles for Linux boxes☆52Updated last month
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆116Updated 6 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆169Updated 2 years ago
- Repo for all my exploits/PoCs☆50Updated last month
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated last month
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆65Updated this week
- exfiltration/infiltration toolkit☆23Updated last year
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆45Updated last year
- ☆58Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆111Updated 2 months ago
- Framework for blind boolean-based sql injections exploatation. Use it if sqlmap does shit.☆29Updated 3 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆29Updated 6 months ago