Feals-404 / GLPIAnarchy
You should think about upgrading your GLPI now
☆23Updated last year
Alternatives and similar repositories for GLPIAnarchy:
Users that are interested in GLPIAnarchy are comparing it to the libraries listed below
- Access All Networks: an offensive multitool against 802.1X☆13Updated 2 weeks ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆145Updated last month
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆122Updated 3 months ago
- ☆17Updated 2 years ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆87Updated 2 months ago
- Generate graphs and charts based on password cracking result☆156Updated last year
- linikatz is a tool to attack AD on UNIX☆140Updated last year
- Docker images of the Exegol project☆94Updated last week
- Lookup for interesting stuff in SMB shares☆149Updated last year
- ☆36Updated 2 weeks ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Updated 4 months ago
- SNMPv3 Authentication Bruteforcer☆35Updated 3 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆67Updated 10 months ago
- Memory mapping profiles for forensic analysis using volatility 2☆46Updated 2 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆59Updated 2 years ago
- Generate email permutations from a name and verify if this email exist with different providers (gmail, duckduckgo, yahoo, yandex)☆38Updated 6 months ago
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆86Updated this week
- A complete table of results of types comparison in multiple languages☆27Updated 2 years ago
- Collaborative vulnerability database for Pentesting & Pwndoc-Ng☆16Updated last year
- GLPIScan is a vulnerability scanner for GLPI.☆24Updated last year
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆82Updated 7 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆98Updated last year
- Quelques conseils autour des obligations légales, fiscales et juridique pour la pratique du Bug Bounty en France☆130Updated 10 months ago
- Check robustness of your (their) Active Directory accounts passwords☆34Updated 10 months ago
- A python script to automatically generate shellcode payload from assembly files.☆13Updated 2 years ago
- Find the remote website version based on a git repository☆125Updated 3 years ago
- Simultaneously search CVEs and exploits across multiple cybersecurity data sources.☆13Updated 3 years ago
- Azure mindmap for penetration tests☆175Updated last year
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆203Updated last year
- ☆53Updated last year