Aetsu / beautyCoonLinks
Beautify Nessus scan output
☆12Updated last year
Alternatives and similar repositories for beautyCoon
Users that are interested in beautyCoon are comparing it to the libraries listed below
Sorting:
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆38Updated last month
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- CVE-2013-4786 Go exploitation tool☆39Updated 2 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- Multithreaded spraying of a password on all accounts of a domain.☆23Updated 8 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- Python 3 script to dump/scrape/extract company employees from XING API☆40Updated 3 months ago
- A little cheatsheet for NetExec☆29Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Updated 4 years ago
- Red Team Projects with chat.openai.com.☆17Updated 2 years ago
- A user enumeration tool for Slack.☆31Updated last year
- wsnet☆27Updated last month
- fully async implementation of Dirkjan's ROADTools☆32Updated 7 months ago
- exfiltration/infiltration toolkit☆23Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆20Updated 4 months ago
- Modified version of PEAS client for offensive operations☆42Updated 2 years ago
- exfiltration/infiltration toolkit☆48Updated last year
- A script to automate keystrokes through a graphical desktop program.☆34Updated 4 months ago
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆20Updated 7 months ago
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆26Updated 2 years ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Creates and sends fake meeting invite☆71Updated 4 years ago
- Ease and assist the compromise of an Active Directory environment.☆30Updated 4 years ago
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆34Updated 8 months ago