tobor88 / BashLinks
Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.
☆39Updated last year
Alternatives and similar repositories for Bash
Users that are interested in Bash are comparing it to the libraries listed below
Sorting:
- ☆20Updated 4 years ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- Cheat-Sheet of tools for penetration testing☆56Updated 2 years ago
- Command Execution exploiter with an auto connection handling☆32Updated 3 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Ease and assist the compromise of an Active Directory environment.☆30Updated 4 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆62Updated 3 years ago
- ☆14Updated 4 years ago
- An introduction on how to build a multithreaded ping sweeper and port scanner with Python 3☆27Updated 4 years ago
- Automatically run and save ffuf scans for multiple IPs☆81Updated last year
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Updated 4 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆44Updated 7 months ago
- Pentesting notes☆17Updated 6 months ago
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- Resources for AD penetration testing and security☆32Updated 3 years ago
- Penetration Testing with Kali Linux☆22Updated 5 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 7 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- ☆24Updated 6 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆28Updated 4 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Updated 3 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- Pentest stuff☆49Updated last year
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 3 years ago
- Information-Gathering Shell Script☆30Updated 4 years ago
- Windows privilege escalation with cmd☆91Updated 3 years ago
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago