s0i37 / net
Useful collection of scapy-scripts and more
☆26Updated 7 months ago
Alternatives and similar repositories for net:
Users that are interested in net are comparing it to the libraries listed below
- exfiltration/infiltration toolkit☆44Updated 3 months ago
- 1C RAS Offensive Security Tool☆24Updated last year
- karma WiFi attack implementation☆48Updated 3 months ago
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- GitHub CVE Repository Hunt☆18Updated 6 months ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆32Updated 3 years ago
- cve-2021-42013.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.50☆24Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆57Updated 2 weeks ago
- ☆38Updated last year
- POC for a DLL spoofer to determine DLL Hijacking☆60Updated last year
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 2 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆39Updated last year
- VLAN ID Parser☆6Updated 9 months ago
- Source code and examples for PassiveAggression☆55Updated 8 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- ☆41Updated this week
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆112Updated 5 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆81Updated last year
- Repo for all my exploits/PoCs☆37Updated this week
- Privileger is a tool to work with Windows Privileges☆136Updated 2 years ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆103Updated 3 weeks ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆85Updated last month
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 8 months ago
- Docker container for running CobaltStrike 4.10☆36Updated 5 months ago
- C2 Automation using Linode☆80Updated 2 years ago
- Discord C2 Profile for Mythic☆26Updated this week
- Tools used for Pentesting☆22Updated last year
- An asynchronous TCP and UDP port scanner developed by the late Jack C. Louis.☆32Updated 10 years ago
- A swiss army knife for pentesting networks☆24Updated 2 years ago