ticofookfook / payloadsLinks
☆11Updated 3 years ago
Alternatives and similar repositories for payloads
Users that are interested in payloads are comparing it to the libraries listed below
Sorting:
- Red Team Guides☆144Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆78Updated last month
- A compilation of important commands, files, and tools used in Pentesting☆53Updated 3 years ago
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆137Updated 2 years ago
- Red Teaming tools and techniques☆56Updated 2 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆74Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆72Updated 10 months ago
- ☆25Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆52Updated 3 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated last year
- ☆90Updated 2 years ago
- ☆22Updated last year
- ☆65Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- ☆51Updated 3 years ago
- My public notes about offensive security☆166Updated 5 months ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆24Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Updated 2 years ago
- ☆78Updated 2 years ago
- ☆105Updated 2 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 3 years ago
- ☆43Updated 4 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆112Updated 2 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- ☆15Updated 2 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Updated last year
- Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerability☆80Updated 3 years ago