0xded093 / Serpico-NGView external linksLinks
Serpico-NG https://github.com/LUTECH-TMS-CERT/EHAT-NG
☆10Dec 6, 2017Updated 8 years ago
Alternatives and similar repositories for Serpico-NG
Users that are interested in Serpico-NG are comparing it to the libraries listed below
Sorting:
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- Gophish with Malicious Attachment and HTTP redirect support☆13Dec 11, 2023Updated 2 years ago
- IPSec testing tool☆19Oct 19, 2024Updated last year
- ☆18Feb 14, 2019Updated 7 years ago
- Executes lateral movement through PowerPoint DCOM objects☆20Feb 3, 2018Updated 8 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Social Engineering Abusing Google App Scripts☆24Jan 13, 2026Updated last month
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- Checkpoint Firewall Ruleset Auditor ( For the HTML exports when you do not have the object files )☆39Mar 30, 2017Updated 8 years ago
- ☆41Updated this week
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- dirb is a system for creating, managing and searching complex directory structures☆10Dec 12, 2015Updated 10 years ago
- To host ProcessMaker v3 Community Editions☆10Jun 18, 2024Updated last year
- ☆12Feb 16, 2012Updated 14 years ago
- Malifar is a GPU-accelerated NSEC3 DNS zone dumper☆14Jun 4, 2024Updated last year
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Aug 2, 2023Updated 2 years ago
- autocrack adds queue support for hashcat cracking.☆41Mar 16, 2023Updated 2 years ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆55Nov 15, 2022Updated 3 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Oct 13, 2022Updated 3 years ago
- ☆12Oct 10, 2024Updated last year
- Spawn Up quickly Elastic EDR Panel☆13Jan 29, 2022Updated 4 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- Verify and decrypt .NET's .ASPXAUTH cookie from node.☆11Jul 18, 2023Updated 2 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- Using a Google a Programmable Search Engine to make custom Digital Business Card Search Engine☆10Oct 4, 2022Updated 3 years ago
- This repository provide a json file for all Windows security Event IDs with lot of useful informations (Categories, GPO, Volume, Recomman…☆11Mar 2, 2023Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- A tool to find/download malware samples from various public repositories☆12Dec 22, 2021Updated 4 years ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- C2 frameworks for RTO, server and implants for stealth red-teaming mode.☆13Sep 11, 2024Updated last year
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated 2 weeks ago
- Simple static web site for collecting resources to learn more about aws and cloud☆12Jun 19, 2023Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- old website files☆10Jun 30, 2016Updated 9 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 5 months ago
- Make your swine run like it's Divine☆10Mar 14, 2025Updated 11 months ago