AutoRecon / AutoReconLinks
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
☆5,836Updated last month
Alternatives and similar repositories for AutoRecon
Users that are interested in AutoRecon are comparing it to the libraries listed below
Sorting:
- A script that you can run in the background!☆2,935Updated last year
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,813Updated 2 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,768Updated 2 years ago
- The ultimate WinRM shell for hacking/pentesting☆5,171Updated last week
- Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report☆3,999Updated 4 months ago
- Fancy reverse and bind shell handler☆2,858Updated last year
- Monitor linux processes without root permissions☆5,813Updated 2 years ago
- 🎯 Command Injection Payload List☆3,688Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,427Updated 9 months ago
- Red Teaming & Pentesting checklists for various engagements☆2,626Updated 5 months ago
- Linux privilege escalation auditing tool☆6,333Updated last year
- A swiss army knife for pentesting networks☆9,010Updated 2 years ago
- Windows / Linux Local Privilege Escalation Workshop☆2,029Updated 3 years ago
- Red Teaming Tactics and Techniques☆4,456Updated last year
- ☆2,656Updated last year
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,314Updated last year
- ☆2,350Updated 2 years ago
- Windows Exploit Suggester - Next Generation☆4,720Updated last week
- Writeups for HacktheBox 'boot2root' machines☆2,004Updated 2 years ago
- Pentest Report Generator☆2,714Updated 3 weeks ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,564Updated last week
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,011Updated 2 months ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,518Updated 2 years ago
- CeWL is a Custom Word List Generator☆2,515Updated 2 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,175Updated 3 weeks ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,971Updated 2 weeks ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,410Updated 2 months ago
- A Tool for Domain Flyovers☆5,889Updated 3 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,907Updated 3 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,774Updated 5 months ago