t3l3machus / Synergy-httpxLinks
A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving content dynamically (e.g. payloads).
☆133Updated last year
Alternatives and similar repositories for Synergy-httpx
Users that are interested in Synergy-httpx are comparing it to the libraries listed below
Sorting:
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated last year
- Automate Scoping, OSINT and Recon assessments.☆95Updated 6 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆179Updated last year
- Pentest/Red Team: Resources, repos and scripts.☆72Updated 2 weeks ago
- ☆65Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated last year
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆164Updated 4 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- ☆92Updated 2 years ago
- A collection of tools that I use in CTF's or for assessments☆101Updated 6 months ago
- Red Team Guides☆139Updated last year
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- Red Teaming tools and techniques☆53Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆79Updated 11 months ago
- NetProbe: Network Probe☆163Updated 10 months ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆69Updated 2 years ago
- ☆65Updated last year
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆108Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- Crack Everything for CrackMapExec version 6☆20Updated last year
- A curated list wordlists for bruteforcing and fuzzing☆83Updated 2 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆69Updated last year
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆71Updated 10 months ago
- Mass bruteforce authentication of common services with common credentials.☆48Updated last year
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆86Updated 11 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆70Updated 4 months ago