BusesCanFly / PRETty
"PRinter Exploitation Toolkit" LAN automation tool
☆206Updated 5 years ago
Alternatives and similar repositories for PRETty
Users that are interested in PRETty are comparing it to the libraries listed below
Sorting:
- Simple Karma Attack☆69Updated 4 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆83Updated 4 years ago
- Enumerate a target Based off of Nmap Results☆78Updated last year
- Automate Metasploit scanning and exploitation☆115Updated 7 months ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 6 years ago
- Tool made to automate tasks of pentesting.☆165Updated 5 years ago
- Wavestone's web interface for password cracking with hashcat☆170Updated 3 years ago
- Red Login: SSH Brute-force Tools☆103Updated 6 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Updated 5 years ago
- Let's find someone's account☆163Updated 5 years ago
- ☆60Updated 7 years ago
- An advanced graphical search engine for Exploit-DB☆118Updated 11 months ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 4 years ago
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆84Updated 7 years ago
- Tool for exploiting SQL injection vulnerabilities that sqlmap can't find.☆96Updated 6 years ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60Updated 6 years ago
- A simple XSS finding tool☆109Updated 6 years ago
- Airodump-ng WiFi Scan Visualizer☆58Updated 7 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆121Updated last year
- Automated Tools Pentest☆7Updated 2 years ago
- Script for Kali that adds a bunch of tools and customizes it to be much better☆182Updated 4 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆50Updated 7 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆70Updated last year
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆290Updated 6 months ago
- wifi attacks suite☆59Updated 4 years ago
- ☆81Updated last year
- My collection of nmap nse modules☆63Updated 5 years ago