BishopFox / anti-anti-automationLinks
Anti-Anti-Automation Framework
☆99Updated 11 years ago
Alternatives and similar repositories for anti-anti-automation
Users that are interested in anti-anti-automation are comparing it to the libraries listed below
Sorting:
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- Recursively searches a directory for any file containing a specified string☆46Updated 10 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 9 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79Updated 8 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Updated 10 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- Automatically performs the SMB relay attack☆73Updated 9 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆44Updated 9 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 10 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- Scrapes the web for reliable http or https proxies and prints them to stdout. Can also be used as a python library to easily generate rel…☆34Updated 5 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆47Updated 3 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 9 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Windows Offline Common Password Hash Checker☆29Updated 9 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Updated 9 years ago
- Babel Scripting Framework☆43Updated 4 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆86Updated 6 years ago
- Rogue AP killer☆90Updated 7 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 8 years ago