A3h1nt / gimmeSH
For pentesters who don't wanna leave their terminals.
☆183Updated 3 years ago
Alternatives and similar repositories for gimmeSH:
Users that are interested in gimmeSH are comparing it to the libraries listed below
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆153Updated this week
- A WLAN red team framework.☆150Updated 5 months ago
- Simple HTTP listener for security testing☆113Updated 4 months ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆96Updated last year
- ☆119Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated 8 months ago
- Wordlists handcrafted (and automated) with ♥☆215Updated last week
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆324Updated 5 months ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆298Updated last year
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆429Updated last year
- Lookup for interesting stuff in SMB shares☆149Updated last year
- Incursore came from nmapAutomator to be your personal raider while you enumerate a target.☆54Updated 8 months ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- parse nmap files☆148Updated last year
- Reconnaissance and Enumeration automation script☆52Updated 4 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆346Updated 2 years ago
- ☆64Updated last year
- Ansible playbook to deploy a phishing engagement in the cloud.☆218Updated 2 years ago
- The purpose of this script is to automate the web enumeration process and search for exploits☆114Updated 2 years ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆198Updated 8 months ago
- This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to…☆124Updated 5 months ago
- Windows for Red Teamers☆127Updated 2 years ago
- msImpersonate - User account impersonation written in pure Python3☆107Updated 2 years ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆209Updated 2 years ago
- Divide full port scan results and use it for targeted Nmap runs☆318Updated 8 months ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆105Updated 3 months ago
- A set of recipes useful in pentesting and red teaming scenarios☆141Updated last year
- Test tool for CVE-2020-1472☆34Updated last year
- ☆161Updated 3 years ago
- brute-forcing su for fun and possibly profit☆87Updated 5 years ago