CatherineFramework / mercyLinks
Mercy is an open-source Rust crate and CLI designed for building cybersecurity utilities and projects.
☆11Updated last year
Alternatives and similar repositories for mercy
Users that are interested in mercy are comparing it to the libraries listed below
Sorting:
- Automate Scoping, OSINT and Recon assessments.☆96Updated 5 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 8 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆68Updated 3 months ago
- Workshop & Talk Slide Decks from HackSpaceCon☆25Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆167Updated last year
- Nuclei templates for honeypots detection.☆196Updated last year
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆33Updated 2 years ago
- aws cli pentesting/red team snippets☆32Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- Red Team Guides☆138Updated last year
- A curated list wordlists for bruteforcing and fuzzing☆83Updated 2 years ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 5 months ago
- ☆25Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆93Updated 11 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆150Updated 7 months ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆94Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- Modules for my C2 course students to use for their own projects.☆74Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- ☆24Updated 7 months ago
- JWT Auditor – Analyze, break, and understand your tokens like a pro.☆49Updated last week
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆78Updated last year
- Powershell tools used for Red Team / Pentesting.☆78Updated last year
- ☆92Updated last year
- Script related in Active Directory Attacks Domain☆22Updated last year
- ☆18Updated 2 years ago
- Vulnerabilities you my miss during a penetration testing.☆99Updated last year