salcho / qwerty-genLinks
Generates keyboard sequences according to a given layout and creates dictionary files for bruteforcing
☆14Updated 11 years ago
Alternatives and similar repositories for qwerty-gen
Users that are interested in qwerty-gen are comparing it to the libraries listed below
Sorting:
- Python script to exploit java unserialize on t3 (Weblogic)☆61Updated 7 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- ☆138Updated 8 years ago
- A webshell connection tool with customized WAF bypass payloads☆125Updated 6 years ago
- ☆34Updated 9 years ago
- Encode powershell payload into bat files☆154Updated 7 years ago
- Tools developed to test the Redirect to SMB issue☆84Updated 10 years ago
- Ye olde root shell for ye olde httpd☆44Updated 10 years ago
- Brute forcer and shell deployer for WildFly☆99Updated 7 years ago
- PHP root (suid) reverse shell☆73Updated 8 years ago
- Splunk Web Shell☆51Updated 10 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆210Updated 9 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- Windows 7 UAC Bypass Vulnerability in the Windows Script Host☆105Updated 9 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆80Updated 8 years ago
- Test and exploit for CVE-2017-12542☆88Updated 7 years ago
- ☆63Updated 7 years ago
- Patch pyc files with your code. Fairly lame.☆68Updated 9 years ago
- A bunch of useful SSH tools for powershell☆119Updated 6 years ago
- Decrypt MITM SSL RDP and save to pcap☆53Updated 11 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 7 years ago
- This project is just a dumping ground for random scripts I've developed.☆139Updated 11 months ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆171Updated 7 years ago
- JavaScript Reversed TCP Meterpreter Stager☆137Updated 8 years ago
- Uses Invoke-Shellcode to execute a payload and persist on the system.☆115Updated 8 years ago
- MS17-010☆63Updated 7 years ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- Make Windows LNK file with python (pylnk)☆66Updated 9 years ago
- Verification tools for CVE-2016-1287☆33Updated 8 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Updated 9 years ago