Ice3man543 / hawkeyeLinks
Hawkeye filesystem analysis tool
☆235Updated 6 years ago
Alternatives and similar repositories for hawkeye
Users that are interested in hawkeye are comparing it to the libraries listed below
Sorting:
- an asynchronous target enumeration tool☆244Updated 2 years ago
- a CLI for ephemeral penetration testing☆13Updated 5 years ago
- An XSS reverse shell framework☆308Updated 6 years ago
- ⚠️WARNING: This project now become part of https://github.com/j3ssie/Metabigor project☆178Updated 5 years ago
- Search Exploitable Software on Linux☆228Updated 2 years ago
- rapid content discovery tool for recursively querying webservers, handy in pentesting and web application assessments☆246Updated 5 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆387Updated 6 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- Working Python test and PoC for CVE-2018-11776, includes Docker lab☆125Updated 6 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆255Updated 2 weeks ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆286Updated 6 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- Linux Privilege Escalation Tool☆184Updated 6 years ago
- A Go implementation of dirsearch.☆279Updated 3 years ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆227Updated 7 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆306Updated 7 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆166Updated 5 years ago
- Extract subdomains from SSL certificates in HTTPS sites.☆385Updated 3 months ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 6 years ago
- OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).☆148Updated 5 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆396Updated 5 years ago
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆139Updated 5 years ago
- Some scripts and exploits☆146Updated 6 years ago
- locate and attack Lync/Skype for Business☆337Updated 8 months ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆180Updated 2 years ago
- Python automation of Docker.sock abuse☆212Updated 2 years ago
- Github for the scripts utilised during Penetration test☆235Updated 7 years ago
- Go Web Application Penetration Test☆347Updated 8 months ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆157Updated last year