ChrisJohnRiley / ScytheView external linksLinks
scythe: account enumerator
☆61May 24, 2013Updated 12 years ago
Alternatives and similar repositories for Scythe
Users that are interested in Scythe are comparing it to the libraries listed below
Sorting:
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- Lutech TMS EHAT-NG☆14Jul 8, 2017Updated 8 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Nov 29, 2019Updated 6 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Oct 14, 2017Updated 8 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Oct 8, 2020Updated 5 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Apr 23, 2020Updated 5 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- A bunch of scripts used for network defense during competitions.☆15Apr 3, 2015Updated 10 years ago
- ☆21May 14, 2017Updated 8 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆55Jan 31, 2019Updated 7 years ago
- Inject shellcode into process via "EarlyBird"☆26Aug 30, 2021Updated 4 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- Bruteforce any gmail account with a wordlist or EMAIL:PASSWORD List!☆27Dec 25, 2020Updated 5 years ago
- Web Sight Front-end Community Edition☆24May 25, 2020Updated 5 years ago
- NMAP scripts for TN3270 interaction as well as NJE. Most notably TSO User Enumeration and Brute Force. CICS transaction ID enumeration an…☆28Nov 9, 2016Updated 9 years ago
- z/OS (mainframe) Network Job Entry (NJE) python library and example scripts.☆28Aug 1, 2024Updated last year
- Docker based honeypot (Dionaea & Kippo)☆26Mar 21, 2015Updated 10 years ago
- A facebook hacking framework made by me to hack facebook account using bruteforcing or phishimg and also get auto likes on fb☆28Dec 20, 2020Updated 5 years ago
- Use BeautifulSoup and Python To Scrape A Website. This repo + video was part of a series I did teaching recruiters to code.☆11Jul 6, 2022Updated 3 years ago
- ☆30Aug 8, 2015Updated 10 years ago
- ☆11Jul 26, 2017Updated 8 years ago
- Rethinking the User Interface of AI☆28Updated this week
- ☆10Aug 4, 2020Updated 5 years ago
- A web spider for shodan.io without using the Developer API.☆33Jan 4, 2018Updated 8 years ago
- recon-ng Maltego local transform pack☆39Dec 10, 2013Updated 12 years ago
- medium-rare☆28Nov 21, 2019Updated 6 years ago
- Maintains backlink structure among interlinked Markdown notes☆11Dec 28, 2020Updated 5 years ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆47Apr 2, 2025Updated 10 months ago
- ☆22Jul 26, 2021Updated 4 years ago
- Source Code Intelligence☆30Aug 21, 2017Updated 8 years ago
- ip-keyloger☆10Jan 9, 2026Updated last month
- ☆13Nov 5, 2024Updated last year
- PassWord List Maker☆17Oct 29, 2018Updated 7 years ago
- Borrowed Instructions Synthetic Computation☆70Feb 20, 2015Updated 10 years ago
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆71Dec 5, 2014Updated 11 years ago