DanMcInerney / autorespView external linksLinks
Runs Responder, uploads hashes for cracking, alerts when cracked
☆37Mar 16, 2016Updated 9 years ago
Alternatives and similar repositories for autoresp
Users that are interested in autoresp are comparing it to the libraries listed below
Sorting:
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- Simple, hand-picked list of fuzz strings☆34Nov 5, 2016Updated 9 years ago
- Does some google dorks against a domain☆165Jan 20, 2020Updated 6 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Dec 11, 2015Updated 10 years ago
- Automates some pentest jobs via nmap xml file☆325Sep 7, 2018Updated 7 years ago
- ☆15Aug 28, 2014Updated 11 years ago
- (Unofficial) Python API for http://namechk.com☆20Oct 15, 2015Updated 10 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- Parses Nmap XML files☆25Apr 29, 2015Updated 10 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Sep 6, 2015Updated 10 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Viewer for Observing Multiple Computers using VNC☆18Feb 13, 2010Updated 16 years ago
- IP Address Listing Tool☆12Sep 1, 2013Updated 12 years ago
- A shell / chat bot for XMPP and cloud services☆49Oct 10, 2015Updated 10 years ago
- An automated SMB relay exploitation script.☆153Oct 11, 2016Updated 9 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆16Sep 15, 2013Updated 12 years ago
- Help recover passwords / etc. that were incorrectly entered with a typo☆13Jan 24, 2017Updated 9 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆21May 11, 2017Updated 8 years ago
- Small scripts to assist in pentesting☆19Feb 2, 2021Updated 5 years ago
- ☆58Jul 16, 2017Updated 8 years ago
- DefCon24☆122Sep 2, 2016Updated 9 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆43Mar 2, 2018Updated 7 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆170Mar 7, 2018Updated 7 years ago
- python tor client☆27Sep 19, 2015Updated 10 years ago