Defender bypass for payload execution
-
Updated
Jun 7, 2025 - C
Defender bypass for payload execution
Simple & dirty http fuzzer for pentesting without dependencies
Auxiliar a Coleta de Informação.
GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.
🌐 Use HTTPX, a C-based command-line client, to make HTTP requests easily and generate code snippets in multiple languages.
Simple dependency free UDP scan tool for UNIX/Linux and MS Windows
Minimal windows reverse shell with proxy support
Colección de herramientas y scripts enfocados al Red-Team y CTFs
Multiplatform micro redirector between file and network for pentesting
WiFi/BLE Testing/Offensive Tool/Defensive Tool
Exploit to inject routes into home devices using RIP protocol (UDP raw template)
Process name faker for linux/BSD/Unix
Extract cram filesystem with lzma compression for debug or forensic
ByteRecon - Directory/File and Subdomain Brute-Force Tool
datalink layer sniffer for linux working with libpcap
These sources, prepared based on this excellent write-up: https://hashcat.net/misc/postgres-pth/postgres-pth.pdf, might be used for quickly building Pass-The-Hash enabled PostgreSQL client software on recent versions of Linux & Windows
802.11w-2009 Auditor And Deauthentication Frame Spammer.
Remote Windows port redirector by reverse connection with proxy support
Bannerhunter is a powerful banner grabbing tool written in C
Dll Shellcode Loader POC
Add a description, image, and links to the pentest-tool topic page so that developers can more easily learn about it.
To associate your repository with the pentest-tool topic, visit your repo's landing page and select "manage topics."