8000 program136 / Starred · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View program136's full-sized avatar

Block or report program136

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Post Exploitation agent which uses a browser to do C2 operations.

Go 102 28 Updated May 25, 2018

Osint tool based on namechk.com for checking usernames on more than 100 websites, forums and social networks.

Shell 596 124 Updated Mar 23, 2021

Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment

PowerShell 1,190 162 Updated Oct 24, 2018

Domain user enumeration tool

Python 215 42 Updated Nov 2, 2023

Remote Recon and Collection

PowerShell 452 95 Updated Nov 23, 2017

A collection of Red Team focused tools, scripts, and notes

PowerShell 1,126 195 Updated Nov 19, 2024

PowerSploit - A PowerShell Post-Exploitation Framework

PowerShell 12,365 4,679 Updated Aug 17, 2020

Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authenticat…

Python 4,680 1,726 Updated Jun 15, 2020

Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner

Python 1,818 403 Updated Apr 13, 2022

Framework for Man-In-The-Middle attacks

Python 3,613 1,045 Updated Aug 28, 2018

MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection. The way it works is by injec…

Python 524 184 Updated Apr 13, 2017

Veil 3.1.X (Check version info in Veil at runtime)

Python 4,110 895 Updated Oct 9, 2023

go-audit is an alternative to the auditd daemon that ships with many distros

Go 1,623 163 Updated Apr 21, 2025

X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter

Perl 1,624 469 Updated Oct 8, 2023

This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance phase. It gathers information about the local system, users…

PowerShell 448 121 Updated Oct 3, 2017

pwning IPv4 via IPv6

Python 1,792 258 Updated Feb 20, 2024
PowerShell 522 88 Updated Sep 15, 2022

Exchange privilege escalations to Active Directory

PowerShell 766 117 Updated Apr 23, 2023

Virtual Machine for Adversary Emulation and Threat Hunting

1,278 199 Updated Jan 22, 2025

A PowerShell script to interact with the MITRE ATT&CK Framework via its own API

PowerShell 369 82 Updated Feb 7, 2019

Undark - a SQLite recovery tool for deleted data or corrupt database

C 74 26 Updated Sep 14, 2018

Extracts emails and attachments saved in Microsoft Outlook's .msg files

Python 773 173 Updated May 17, 2025

Invisibly inserting usernames into text with Zero-Width Characters

TypeScript 1,171 85 Updated Jan 6, 2023

CMS Detection and Exploit Kit based on Whatcms.org API

Shell 254 52 Updated Nov 21, 2024

Google App Engine Flask C2 redirector

Python 8 3 Updated Mar 7, 2017

flask pythonanywhere C2 redirector template

Python 7 1 Updated Mar 7, 2017

flask heroku C2 redirector template

Python 11 2 Updated Apr 20, 2017

Chrome extension to alert and possibly block IDN/Unicode websites and zero-day phishing websites using AI and Computer Vision.

JavaScript 118 9 Updated Jun 22, 2018

Kaspersky's GReAT KLara

PHP 708 138 Updated Jul 24, 2024
Next
0