thirdbyte / ssjLinks
Your everyday Linux distribution gone Super Saiyan.
☆62Updated 2 years ago
Alternatives and similar repositories for ssj
Users that are interested in ssj are comparing it to the libraries listed below
Sorting:
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆178Updated 5 years ago
- Collaborative pentest tool with highly customizable tools☆73Updated 4 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆134Updated last week
- An epic web shell☆85Updated 7 months ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 5 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 5 years ago
- Web-based check for Windows privesc vulnerabilities☆140Updated 2 years ago
- Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...☆93Updated 3 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Updated 5 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- automated password spraying tool☆148Updated 4 years ago
- Tool to find SMTP servers vulnerable to open relay☆83Updated 5 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 3 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆142Updated last week
- Offensive Security recon tool☆91Updated 4 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆122Updated 3 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Updated 4 years ago
- A WLAN red team framework.☆155Updated this week
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆119Updated last year
- autocrack adds queue support for hashcat cracking.☆40Updated 2 years ago
- ☆46Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- Some Pentest Tools. Install and keep up to date some pentesting tools. I used this to pass my OSCP exam.☆67Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆82Updated 4 years ago
- ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassin…☆31Updated 4 years ago
- Automate Metasploit scanning and exploitation☆117Updated 6 months ago