sayoojsamuel / crypot
Library of Crypto exploits
☆9Updated last year
Related projects ⓘ
Alternatives and complementary repositories for crypot
- 3gsocks - a reverse connection socks5 based network pivot☆9Updated 3 years ago
- Standardizing Security Titles☆13Updated last year
- Modular C2 server to tame your pack of wolves☆12Updated last year
- Files related to my training classes☆15Updated 3 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆11Updated 3 years ago
- A collection of personal ZAP scripts☆13Updated last year
- module for certexfil☆15Updated 2 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- Advisories and Proofs of Concept by BlackArrow☆17Updated 7 months ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated 7 months ago
- ☆8Updated 3 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 2 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆18Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆16Updated 4 years ago
- Use python to perform Kerberos pre-auth bruteforcing☆11Updated 2 years ago
- Just Enough C2 - A simple but effective server and implant☆9Updated 2 years ago
- Open YARA scan- and search engine☆17Updated last week
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 2 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆12Updated 4 years ago
- Automated encryption utilities and installation☆12Updated 4 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 3 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- Data EXfiltration TestER☆21Updated 5 years ago