AutoRecon / AutoReconLinks
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
☆5,860Updated 2 months ago
Alternatives and similar repositories for AutoRecon
Users that are interested in AutoRecon are comparing it to the libraries listed below
Sorting:
- A script that you can run in the background!☆2,939Updated last year
- Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report☆4,013Updated 5 months ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,827Updated 2 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,785Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,449Updated 9 months ago
- The ultimate WinRM shell for hacking/pentesting☆5,207Updated last week
- Red Teaming & Pentesting checklists for various engagements☆2,632Updated 5 months ago
- Monitor linux processes without root permissions☆5,836Updated 3 years ago
- Fancy reverse and bind shell handler☆2,862Updated last year
- Arsenal is just a quick inventory and launcher for hacking programs☆3,648Updated last year
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,075Updated 2 weeks ago
- Windows / Linux Local Privilege Escalation Workshop☆2,032Updated 3 years ago
- Red Teaming Tactics and Techniques☆4,467Updated last year
- Linux privilege escalation auditing tool☆6,356Updated last year
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,601Updated last week
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,877Updated 2 years ago
- ☆2,355Updated 2 years ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,996Updated this week
- Windows Exploit Suggester - Next Generation☆4,733Updated last week
- ☆2,672Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,252Updated last week
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,780Updated 5 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,046Updated 3 months ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,331Updated last year
- A swiss army knife for pentesting networks☆9,026Updated 2 years ago
- Writeups for HacktheBox 'boot2root' machines☆2,005Updated 2 years ago
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.☆12,505Updated this week
- An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!☆2,212Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,753Updated 7 months ago
- CeWL is a Custom Word List Generator☆2,531Updated 2 months ago