s0lst1c3 / keyboardsnitch
☆11Updated 8 years ago
Related projects: ⓘ
- ☆22Updated this week
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆17Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- collection of useful shells for penetration tests☆36Updated 7 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆25Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆40Updated 6 years ago
- misc pentest tools.☆26Updated 9 years ago
- Tool for automation of GUI-based testing.☆15Updated 9 years ago
- ☆20Updated 8 years ago
- A set of compiled application restriction bypasses☆29Updated 7 years ago
- Format string exploit generation☆9Updated 9 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- Proof of Concept for CVE-2018-11776☆20Updated 6 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆50Updated 6 years ago
- Make Windows LNK file with python (pylnk)☆66Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆18Updated 9 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 6 years ago
- A quick POC on how to embed a meterpreter in Firefox via DLL hijacking☆17Updated 7 years ago
- ☆33Updated this week
- ☆22Updated this week
- ☆23Updated this week
- Environmental (and http) keying for scripting languages☆39Updated 5 years ago
- ☆14Updated this week
- Repository for proxenet plugins☆14Updated 8 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- ☆15Updated 7 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 6 years ago