GrrrDog / TacoTaco
Some scripts for attacks on Tacacs+ protocol
☆64Updated 5 years ago
Alternatives and similar repositories for TacoTaco:
Users that are interested in TacoTaco are comparing it to the libraries listed below
- Easy 802.1Q VLAN Hopping☆80Updated 6 months ago
- ☆57Updated 10 years ago
- A collection of code snippets used in blog posts.☆54Updated 5 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆222Updated 9 years ago
- Decrypt MITM SSL RDP and save to pcap☆53Updated 10 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Updated 10 years ago
- This is a simple parser for/decrypter for Impacket's esentutl.py utility. It assists with decrypting hashes and hash histories from ntds.…☆72Updated 8 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago
- Checkpoint Firewall Ruleset Auditor ( For the HTML exports when you do not have the object files )☆35Updated 7 years ago
- A Docker container for Moloch based on minimal Debian☆26Updated 9 years ago
- DNS zone transfer research☆57Updated 8 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 5 years ago
- A collection of publicly released whitepapers☆49Updated 7 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Tools developed to test the Redirect to SMB issue☆83Updated 9 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 7 years ago
- Babel Scripting Framework☆42Updated 4 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆61Updated 9 years ago
- Splunk Web Shell☆50Updated 9 years ago
- ☆97Updated 8 years ago
- ☆48Updated 9 years ago
- Attack Knowledge Base☆100Updated 7 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆56Updated 10 years ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- Smart Install Client Scanner☆61Updated 5 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆122Updated 5 years ago
- Prometheus Firewall Analyzer☆47Updated 9 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆68Updated 7 years ago
- SMB Auto authentication Vulnerability☆32Updated 8 years ago