A3h1nt / gimmeSHLinks
For pentesters who don't wanna leave their terminals.
☆184Updated 4 years ago
Alternatives and similar repositories for gimmeSH
Users that are interested in gimmeSH are comparing it to the libraries listed below
Sorting:
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆165Updated 2 months ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆181Updated last year
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆306Updated 2 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- Google Dork File Finder☆196Updated 9 months ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- A WLAN red team framework.☆154Updated last year
- MayorSec DNS Enumeration Tool☆89Updated 11 months ago
- ☆67Updated 3 years ago
- ☆120Updated 3 years ago
- Short checklists for penetration testing methodology☆195Updated 2 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆443Updated last year
- Simple C# Port Scanner (Multi-Threaded)☆49Updated 4 years ago
- Simple HTTP listener for security testing☆117Updated 11 months ago
- Harness the Power of AI for all your reporting needs.☆28Updated 2 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆340Updated last year
- Wordlists handcrafted (and automated) with ♥☆220Updated 2 months ago
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆402Updated 9 months ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆215Updated last year
- parse nmap files☆155Updated 4 months ago
- ☆48Updated 3 years ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆215Updated 2 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆144Updated 2 years ago
- Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered fo…☆206Updated 2 years ago
- Automatic Service Enumeration Script☆227Updated 3 years ago
- Miscellaneous scripts for pentesting☆219Updated 7 years ago
- This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential A…☆480Updated 5 months ago
- This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to…☆163Updated last year
- Use this bot to monitor new CVEs containing defined keywords and send alerts to Slack and/or Telegram.☆257Updated 4 months ago