BastienFaure / jarvisLinks
The pentest companion
☆15Updated 3 years ago
Alternatives and similar repositories for jarvis
Users that are interested in jarvis are comparing it to the libraries listed below
Sorting:
- Ansible scripts to build an attack box☆23Updated 6 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 8 years ago
- Search the ExploitDB with a little more control☆21Updated 8 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 8 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 5 years ago
- ☆36Updated 5 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- another nmap summarising script☆26Updated 4 years ago
- Useful commands for infosec☆29Updated 2 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Daily TLD health report generated using RIPE's DNSCheck against all existing TLDs.☆18Updated 8 years ago
- ☆25Updated 4 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- ☆11Updated 9 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- A Web Server to hide stuff☆22Updated 3 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- Assists in mass exportation of Nessus scans☆21Updated 7 years ago
- Kibana app for RedELK☆17Updated 2 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago