Dviros / redboardLinks
Collaborative web dashboard for RedTeam pentesters
☆22Updated 5 years ago
Alternatives and similar repositories for redboard
Users that are interested in redboard are comparing it to the libraries listed below
Sorting:
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- Miscellaneous for various things☆21Updated 7 months ago
- AWS S3 Bucket/Object Finder☆24Updated 7 years ago
- automatic scan for hackthebox☆13Updated 5 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Updated 6 years ago
- ☆20Updated 5 years ago
- Password spraying script and helper for creating password lists☆34Updated 4 years ago
- ☆18Updated 6 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Clean public password dump files and store in ELK☆38Updated 7 years ago
- ☆33Updated 4 months ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Updated 4 years ago
- ☆16Updated 7 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 5 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆17Updated 8 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆32Updated 6 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- another nmap summarising script☆26Updated 4 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 10 years ago
- ☆15Updated 2 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 7 years ago