t3l3machus / Synergy-httpxLinks
A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving content dynamically (e.g. payloads).
☆132Updated last year
Alternatives and similar repositories for Synergy-httpx
Users that are interested in Synergy-httpx are comparing it to the libraries listed below
Sorting:
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆135Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆181Updated last year
- Automate Scoping, OSINT and Recon assessments.☆97Updated last week
- Pentest/Red Team: Resources, repos and scripts.☆75Updated last month
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- ☆25Updated 2 years ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Updated 2 years ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆162Updated 6 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 6 months ago
- ☆65Updated last year
- ☆91Updated 2 years ago
- Mass bruteforce authentication of common services with common credentials.☆49Updated last year
- ☆65Updated 2 years ago
- Red Teaming tools and techniques☆55Updated 2 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆128Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆79Updated last year
- List of Command&Control (C2) software☆45Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- Red Team Guides☆140Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆102Updated last year
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆73Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆109Updated 2 years ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 8 months ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆88Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year