DanMcInerney / CrackMapExecLinks
A swiss army knife for pentesting Windows/Active Directory environments
☆14Updated 7 years ago
Alternatives and similar repositories for CrackMapExec
Users that are interested in CrackMapExec are comparing it to the libraries listed below
Sorting:
- PHP Phishing Framework☆28Updated 11 years ago
- MS17-010☆12Updated 7 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23Updated 7 years ago
- Search bing with python☆12Updated 10 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Script to automate, manage, and multithread Nikto scans.☆60Updated 5 years ago
- A default credential scanner.☆9Updated 6 years ago
- ☆19Updated 10 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Updated 8 years ago
- Software exploitation training material☆15Updated 8 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆12Updated 11 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆8Updated 8 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 11 months ago
- web information gathering / Grab links☆43Updated 5 years ago
- Tool for performing lots of DNS queries quickly☆18Updated 10 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 10 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 8 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago