venerasf / VeneraLinks
A modular exploitation framework extensible with Lua
☆65Updated 3 months ago
Alternatives and similar repositories for Venera
Users that are interested in Venera are comparing it to the libraries listed below
Sorting:
- A fork of the Go language with some tweaks☆51Updated 4 months ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆77Updated last month
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆65Updated last year
- A blazing-fast, thread-safe, straightforward and zero memory allocations tool to swiftly generate alternative IP(v4) address representati…☆89Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 8 months ago
- 🚀 CSRFShark - a utility for manipulating cross-site request forgery attacks☆34Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- Fast Path Traversal exploitation tool☆21Updated last year
- masscan with exclusive excludes☆57Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆64Updated 9 months ago
- Jasmin ransomware web panel path traversal PoC☆21Updated last year
- A command-line utility for performing reverse DNS lookups☆70Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated 11 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- 😹 Python project to bruteforce Apache Tomcat manager login with known-default credentials☆101Updated last year
- A tool which helps identifying client-side prototype polluting libraries☆39Updated last month
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 3 years ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Updated 10 months ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆41Updated last week
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆47Updated last year
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆49Updated 3 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- One line command and control backdoors for APIs and web applications.☆50Updated last year
- ☆27Updated 2 years ago
- ☆59Updated 8 months ago
- Check IP addresses against known cloud provider IP address ranges☆45Updated last year
- NoBlindi is a command-line tool for exploiting blind NoSQL injection vulnerabilities to recover passwords in web applications.☆29Updated last year
- Hijack a slack bot to phish your way in☆55Updated 2 months ago