A3h1nt / gimmeSHLinks
For pentesters who don't wanna leave their terminals.
☆184Updated 4 years ago
Alternatives and similar repositories for gimmeSH
Users that are interested in gimmeSH are comparing it to the libraries listed below
Sorting:
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆165Updated 3 months ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆98Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆182Updated last year
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆151Updated 4 years ago
- A WLAN red team framework.☆155Updated last year
- Google Dork File Finder☆196Updated 10 months ago
- MayorSec DNS Enumeration Tool☆89Updated 11 months ago
- Simple HTTP listener for security testing☆118Updated 11 months ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆306Updated 2 years ago
- parse nmap files☆155Updated 5 months ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆445Updated 2 years ago
- Use this bot to monitor new CVEs containing defined keywords and send alerts to Slack and/or Telegram.☆256Updated 5 months ago
- ☆120Updated 3 years ago
- Simple C# Port Scanner (Multi-Threaded)☆49Updated 4 years ago
- ☆66Updated 3 years ago
- ☆48Updated 4 years ago
- Short checklists for penetration testing methodology☆195Updated 2 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Updated 2 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆345Updated last year
- Wordlists handcrafted (and automated) with ♥☆222Updated 3 months ago
- A Zphisher GUI Back-Office Plugin☆233Updated 2 years ago
- Pwnspoof repository☆265Updated 2 years ago
- This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to…☆168Updated last year
- OSCP preparation tools, scripts and cheatsheets☆59Updated 2 years ago
- Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered fo…☆206Updated 2 years ago
- list of useful commands, shells and notes related to OSCP☆80Updated 7 years ago
- Test tool for CVE-2020-1472☆37Updated 2 years ago
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆403Updated 10 months ago
- A set of recipes useful in pentesting and red teaming scenarios☆145Updated 2 years ago