CyberDruid-Codes / Automated-ReconatorLinks
☆11Updated 3 years ago
Alternatives and similar repositories for Automated-Reconator
Users that are interested in Automated-Reconator are comparing it to the libraries listed below
Sorting:
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆17Updated 2 years ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Updated last year
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆21Updated 3 weeks ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆28Updated 3 months ago
- Central IoC scanner based on Loki☆20Updated 4 years ago
- web application pentesting tools for docker☆17Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- nmap nse script for scan a whole country☆13Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- Ease and assist the compromise of an Active Directory environment.☆30Updated 4 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- New Framework Red Team Operations☆19Updated 4 years ago
- Cisco CallManager User Enumeration☆15Updated 3 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 4 years ago
- Custom pentesting tools☆26Updated 5 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated 2 years ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆16Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Updated 4 years ago
- ☆27Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Updated 3 years ago
- Some Cheat Sheet for Red Team☆18Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Updated 5 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- this nuclei template finds back up files☆22Updated 5 months ago
- Field guide to gather low-hanging fruits☆14Updated 10 months ago