-
[link]
https://github.com/DragoQCC/HardHatC2
[/link]
[tags]
c2, framework
[/tags]
[short_descr]
A cross-platform, collaborative, Command & Control framework designed for red teaming and eas…
-
[link]
https://github.com/ejedev/web2shell
[/link]
[tags]
webshell, shell
[/tags]
[short_descr]
Automate converting webshells into reverse shells.
[/short_descr]
[long_descr]
A P…
-
[homepage]https://github.com/0xsp-SRD/mortar [/homepage]
[tags]EDR,XDR,Bypass[/tags]
[short_descr]red teaming evasion technique to defeat and divert detection and prevention of security products.Mor…
-
[tags]usb,framework,exploits,network[/tags]
[short_descr]Turn a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming or PE.[/short_descr]
[link] https://github.com/Rogan…
-
[link]https://github.com/ihebski/DefaultCreds-cheat-sheet[/link]
[short_descr]One place for all the default credentials to assist on finding devices with default password.[/short_descr]
[tags]passwo…
-
https://github.com/lks-ai/anynode/blob/1f7b8372890ee0b9143d6d73904e8cb4fe54ebb1/nodes/any.py#L196
For the allowed APIs, it is best to use a whitelist approach if possible, and at the minimum, black…
-
I am trying to use Medusa to brute-force MSSQL logins (disclaimer: authorized). Before running larger user and password lists, I am trying to verify accurate function against the SQL Server with a kno…
-
### General information about this request
- [X] I confirm that I have read the [Information for Submitters](https://aclanthology.org/info/contrib/).
- [ ] I am submitting a request for a **new ve…
kfnks updated
9 months ago
-
### Overview
This issue tracks the running agenda for the Content team weekly meetings (Tuesdays 11AM PST)
Reply in the comment using this format to create weekly agenda.
#### Format
```
# […
-
[homepage]https://github.com/signorrayan/RedTeam_toolkit[/homepage]
[tags]scanner,cves,vulnerabilities,directories,reports,xss[/tags]
[short_descr]Open source Django offensive webapp which is keeping …