BastienFaure / jarvis
The pentest companion
☆14Updated 3 years ago
Alternatives and similar repositories for jarvis:
Users that are interested in jarvis are comparing it to the libraries listed below
- Ansible scripts to build an attack box☆22Updated 6 years ago
- Useful commands for infosec☆29Updated 2 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- An information gathering tool to collect git emails in version control host services☆11Updated 5 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 7 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- another nmap summarising script☆25Updated 4 years ago
- WStalker: an easy proxy☆25Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 7 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- ☆11Updated 6 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- introduction to distributed scanning using vultr☆11Updated 7 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Updated 6 years ago
- An MSF plugin to send notifications to Slack when shells are created or killed☆14Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago