One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
-
Updated
May 27, 2024 - Python
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
A Python Script Containing Lots Of Hacking Tools.
OSCP Cheat Sheet
FIshShell is a multi-session handler and Windows & Linux backdoor payload generator. It allows users\targets to connect to the server (other machines running the multi-handler) after which the server admin/attacker can join sessions and also get a non-interactive reverse shell.
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
RevEng.AI Toolkit and Python API
Golang C2 Server and Agents using XMT (https://github.com/iDigitalFlame/xmt)
Run a browser extension in a sandboxed web browser and without any fear of corrupting or loosing your real data.
Automated NoSQL database enumeration and web application exploitation tool.
An automated penetration testing tool , that automates web vulnerabilities testing upon a given URL with an endpoint parameter
Cheat sheets and information to pentest AWX and Ansible Tower. Written for Nsec 2024.
Scanner de portas prático e simples
Bypass 4xx HTTP response status codes and more. Based on PycURL and Python Requests.
Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).
Generate a wordlist to fuzz amounts or any other numerical values.
Search Google Dorks like Chad. / Social media takeover tool.
Extract and convert property list files from SQLite database files and from other property list files.
Scrape files for sensitive information, and generate an interactive HTML report. Based on Rabin2.
Web crawler and scraper based on Scrapy and Playwright's headless browser.
Add a description, image, and links to the offensive-security topic page so that developers can more easily learn about it.
To associate your repository with the offensive-security topic, visit your repo's landing page and select "manage topics."