sensepost / dwnLinks
d(ockerp)wn - a docker pwn tool manager
☆157Updated 4 years ago
Alternatives and similar repositories for dwn
Users that are interested in dwn are comparing it to the libraries listed below
Sorting:
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆94Updated 6 years ago
- Automated 802.1x Bypass☆84Updated 5 years ago
- Parse NTLM challenge messages over HTTP and SMB☆148Updated 2 years ago
- DupeKeyInjector☆135Updated 3 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 4 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106Updated 5 years ago
- SNIcat☆126Updated 3 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Updated 2 years ago
- An epic web shell☆84Updated last week
- ☆129Updated 2 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 5 years ago
- Burp with Friends☆103Updated 2 years ago
- A repository of previous info-sec presentations I've presented.☆161Updated 7 months ago
- Sustainable shellcode evasion☆109Updated 6 months ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆222Updated 4 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- easy-to-use payload hosting☆270Updated 3 years ago
- ☆80Updated 3 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 2 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆112Updated 2 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆177Updated 2 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆107Updated 4 years ago
- ☆98Updated 4 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- SonicWall SSL-VPN Exploit☆176Updated 4 years ago
- Web-based check for Windows privesc vulnerabilities☆139Updated 2 years ago
- Python library and client for token manipulations and impersonations for privilege escalation on Windows☆122Updated 2 years ago
- lateral movement techniques that can be used during red team exercises☆273Updated 5 years ago