Feals-404 / GLPIAnarchy
You should think about upgrading your GLPI now
☆25Updated 2 years ago
Alternatives and similar repositories for GLPIAnarchy
Users that are interested in GLPIAnarchy are comparing it to the libraries listed below
Sorting:
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆148Updated 3 months ago
- ☆17Updated 2 years ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆90Updated last month
- Access All Networks: an offensive multitool against 802.1X☆16Updated 4 months ago
- Generate graphs and charts based on password cracking result☆161Updated 2 years ago
- VULNSPY regularly retrieves the latest alerts published by the CERT-FR and the related vulnerabilities with their CVSS score and allows y…☆38Updated 2 years ago
- GLPI vulnerabilities checking tool☆114Updated last month
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆132Updated 6 months ago
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆100Updated 3 weeks ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆19Updated 4 months ago
- Collaborative vulnerability database for Pentesting & Pwndoc-Ng☆20Updated 2 years ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Updated 7 months ago
- Quelques conseils autour des obligations légales, fiscales et juridique pour la pratique du Bug Bounty en France☆136Updated 3 weeks ago
- ☆38Updated last month
- Speed up your pentest enumeration☆83Updated last week
- SNMPv3 Authentication Bruteforcer☆35Updated 3 years ago
- ☆35Updated 3 years ago
- GLPIScan is a vulnerability scanner for GLPI.☆26Updated last year
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆61Updated 3 years ago
- Identify the accounts most vulnerable to dictionary attacks☆119Updated last month
- IPSpinner works as a local proxy that redirects requests through external services.☆47Updated last month
- ☆14Updated 8 months ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆96Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆146Updated last year
- Active Directory Mindmap Recipes: A Compromise à la Carte☆110Updated last month
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆73Updated last year
- A python tool to automate KeePass discovery and secret extraction.☆486Updated 5 months ago
- Simple HTTP listener for security testing☆113Updated 5 months ago
- ☆164Updated last month
- Docker images of the Exegol project☆108Updated this week