Collaborative Distributed Scanning Application (Uses modified DNmap on backend)
☆71Jun 10, 2016Updated 9 years ago
Alternatives and similar repositories for Minions
Users that are interested in Minions are comparing it to the libraries listed below
Sorting:
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Jan 22, 2019Updated 7 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- A shell / chat bot for XMPP and cloud services☆49Oct 10, 2015Updated 10 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- Executes PowerShell from an unmanaged process☆29Dec 15, 2014Updated 11 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- See here:☆43Dec 6, 2012Updated 13 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆168Jun 8, 2017Updated 8 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Sep 21, 2017Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Sep 24, 2014Updated 11 years ago
- NMAP Patches and NSE Scripts☆19Apr 4, 2013Updated 12 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Aug 18, 2020Updated 5 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049☆51Jul 22, 2017Updated 8 years ago
- A python based https remote access trojan for penetration testing☆84Jan 7, 2016Updated 10 years ago
- autoscan - automatic fingerprint of visited networks☆11Nov 2, 2013Updated 12 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- Windows Privesc Check - PowerShell☆67Apr 22, 2022Updated 3 years ago
- ☆27Jul 18, 2017Updated 8 years ago
- This is a pack of Cortana scripts commonly used on our pentests.☆70Nov 25, 2014Updated 11 years ago
- Listening Post for Throwback Implant☆111Jan 26, 2016Updated 10 years ago
- ☆18Nov 6, 2016Updated 9 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- HTTP/S Beaconing Implant☆311Aug 25, 2017Updated 8 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- A python module that monkey patches pexpect mainly for binary transfers.☆18Feb 28, 2019Updated 7 years ago
- Asynchronous scanning library☆21Nov 13, 2014Updated 11 years ago