NetworkAssessment: Network Compromise Assessment Tool
☆94May 31, 2024Updated last year
Alternatives and similar repositories for NetworkAssessment
Users that are interested in NetworkAssessment are comparing it to the libraries listed below
Sorting:
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆130Jun 1, 2024Updated last year
- Security testing tool for analyzing HTTP 403 responses and identifying access control misconfigurations in web applications.☆167Jan 6, 2026Updated last month
- Web Path Finder☆60Nov 22, 2023Updated 2 years ago
- Simple Latest CVE Collector Written in Python☆59Feb 29, 2024Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- ☆24Nov 18, 2023Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated last year
- Mass bruteforce authentication of common services with common credentials.☆54Dec 2, 2023Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Feb 20, 2026Updated last week
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆128Dec 23, 2025Updated 2 months ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- Secrets scanner that understands code☆166Dec 3, 2025Updated 2 months ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- A comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape.☆109Sep 7, 2023Updated 2 years ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆144May 17, 2024Updated last year
- NetProbe: Network Probe☆173Oct 13, 2024Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Feb 3, 2024Updated 2 years ago
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆160Sep 7, 2023Updated 2 years ago
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆192Apr 11, 2025Updated 10 months ago
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated last year
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆162Oct 8, 2025Updated 4 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Jan 19, 2023Updated 3 years ago
- A tool designed to automate various techniques in order to bypass HTTP 401 and 403 response codes and gain access to unauthorized areas i…☆221Aug 31, 2024Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆373Apr 6, 2024Updated last year
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆13Jan 10, 2021Updated 5 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆70Feb 3, 2024Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Powershell tools used for Red Team / Pentesting.☆81Jan 8, 2024Updated 2 years ago
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year