A3h1nt / gimmeSHLinks
For pentesters who don't wanna leave their terminals.
☆184Updated 4 years ago
Alternatives and similar repositories for gimmeSH
Users that are interested in gimmeSH are comparing it to the libraries listed below
Sorting:
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆164Updated last month
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆181Updated last year
- MayorSec DNS Enumeration Tool☆88Updated 10 months ago
- Simple HTTP listener for security testing☆116Updated 10 months ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- Simple C# Port Scanner (Multi-Threaded)☆49Updated 4 years ago
- ☆67Updated 3 years ago
- Google Dork File Finder☆196Updated 9 months ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆305Updated 2 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆337Updated 11 months ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆213Updated 2 years ago
- Use this bot to monitor new CVEs containing defined keywords and send alerts to Slack and/or Telegram.☆255Updated 4 months ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- list of useful commands, shells and notes related to OSCP☆80Updated 7 years ago
- A WLAN red team framework.☆154Updated last year
- OSCP preparation tools, scripts and cheatsheets☆57Updated 2 years ago
- Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered fo…☆206Updated 2 years ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆212Updated last year
- ☆17Updated 3 years ago
- Harness the Power of AI for all your reporting needs.☆28Updated 2 years ago
- A simple Bash script to automate some organization and repetitive tasks while doing TryHackMe or HackTheBox machines☆38Updated last year
- Abertay CMP202 Project☆34Updated 4 years ago
- ☆119Updated 3 years ago
- Domain_checker application is the trial/demo version for the new EASM (External Attack Surface Management) system called HydrAttack (hydr…☆189Updated last year
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆442Updated last year
- ☆223Updated 4 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆361Updated 3 months ago
- parse nmap files☆154Updated 4 months ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated 2 years ago