Feals-404 / GLPIAnarchy
You should think about upgrading your GLPI now
☆25Updated 2 years ago
Alternatives and similar repositories for GLPIAnarchy:
Users that are interested in GLPIAnarchy are comparing it to the libraries listed below
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆147Updated last month
- Access All Networks: an offensive multitool against 802.1X☆15Updated 2 months ago
- ☆17Updated 2 years ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆89Updated 4 months ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆128Updated 5 months ago
- ☆92Updated last week
- Generate graphs and charts based on password cracking result☆161Updated 2 years ago
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆95Updated 3 weeks ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆19Updated 2 months ago
- linikatz is a tool to attack AD on UNIX☆145Updated last year
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆86Updated 9 months ago
- GLPI vulnerabilities checking tool☆89Updated this week
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated 7 months ago
- VULNSPY regularly retrieves the latest alerts published by the CERT-FR and the related vulnerabilities with their CVSS score and allows y…☆38Updated 2 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆61Updated 3 years ago
- Docker images of the Exegol project☆102Updated last week
- Generate email permutations from a name and verify if this email exist with different providers (gmail, duckduckgo, yahoo, yandex)☆40Updated last month
- Script to retrieve the master password of a keepass database <= 2.53.1☆98Updated 11 months ago
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆47Updated 2 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆70Updated last year
- A collection of practical implementation of security recommendations☆13Updated 6 months ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Updated 6 months ago
- Azure mindmap for penetration tests☆179Updated last year
- Active Directory Penetration Testing Tool☆34Updated 9 months ago
- Shellcode loader based on indirect syscall☆21Updated last month
- A cheatsheet for NetExec☆114Updated last month
- ☆26Updated 2 years ago
- winPEAS, but for Active Directory☆148Updated 4 months ago
- Speed up your pentest enumeration☆83Updated 2 weeks ago
- This tool allows to automatically test for Content Security Policy bypass payloads.☆40Updated 6 months ago