sayoojsamuel / crypot
Library of Crypto exploits
☆9Updated last year
Related projects ⓘ
Alternatives and complementary repositories for crypot
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆11Updated 3 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆9Updated 3 years ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated 7 months ago
- Files related to my training classes☆15Updated 3 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- ☆8Updated 3 years ago
- Modular C2 server to tame your pack of wolves☆12Updated last year
- Simplified NAT Slipstream server and client☆20Updated 3 years ago
- Standardizing Security Titles☆13Updated last year
- Advisories and Proofs of Concept by BlackArrow☆17Updated 7 months ago
- Password spraying toolkit☆7Updated 3 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- ☆17Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- ☆14Updated 9 months ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 3 years ago
- RDP THIEF - inject dll to remote desktop process (mstsc.exe) and steal user credentials.☆13Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆18Updated 4 years ago
- Obtain and parse SSL certificates☆9Updated 2 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆12Updated 4 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- Create an AMI with CobaltStrike and related tools.☆8Updated 2 months ago
- Use python to perform Kerberos pre-auth bruteforcing☆11Updated 2 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- module for certexfil☆15Updated 2 years ago