BusesCanFly / PRETtyLinks
"PRinter Exploitation Toolkit" LAN automation tool
☆211Updated 6 years ago
Alternatives and similar repositories for PRETty
Users that are interested in PRETty are comparing it to the libraries listed below
Sorting:
- Simple Karma Attack☆68Updated 5 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 7 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆84Updated 7 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Updated 6 years ago
- Enumerate a target Based off of Nmap Results☆76Updated 2 years ago
- Wavestone's web interface for password cracking with hashcat☆171Updated 4 years ago
- Tool made to automate tasks of pentesting.☆165Updated 6 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆84Updated 4 years ago
- EternalView is an all in one basic information gathering and vulnerability assessment tool☆139Updated 5 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 5 years ago
- A simple python reverse shell written just for fun.☆63Updated 2 years ago
- Framework for exploiting local vulnerabilities☆84Updated 2 years ago
- My collection of nmap nse modules☆63Updated 6 years ago
- A collection of scripts that help with different aspects of password cracking, such as wordlist generation, mask analysis, and positional…☆109Updated 6 years ago
- Android and iOS source for the Empire mobile app☆90Updated 6 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆69Updated 2 years ago
- Linux setup tool for Kali Linux☆80Updated 7 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 7 years ago
- ☆84Updated 2 years ago
- Automate Metasploit scanning and exploitation☆116Updated 5 months ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆55Updated last year
- ☆59Updated 7 years ago
- VPN pentest tools and scripts☆126Updated 8 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆149Updated 7 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- A shell script that automatically performs a series of *NIX enumeration tasks.☆39Updated 4 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago