Ice3man543 / hawkeyeView external linksLinks
Hawkeye filesystem analysis tool
☆242Jul 21, 2018Updated 7 years ago
Alternatives and similar repositories for hawkeye
Users that are interested in hawkeye are comparing it to the libraries listed below
Sorting:
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Tool aided persistence via Windows URI schemes abuse☆84Mar 1, 2020Updated 5 years ago
- a parser + crawler for .DS_Store files exposed publically☆56Jun 6, 2023Updated 2 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,130Dec 7, 2022Updated 3 years ago
- ☆98Feb 21, 2019Updated 6 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆302Apr 24, 2020Updated 5 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Drupal enumeration & exploitation tool☆616Nov 4, 2020Updated 5 years ago
- A default credential scanner.☆1,503Jul 8, 2025Updated 7 months ago
- Windows passwords decryption from dump files☆511Feb 2, 2023Updated 3 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆212Mar 27, 2022Updated 3 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Feb 18, 2023Updated 2 years ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Python / C# Unmanaged PowerShell based RAT☆771Mar 29, 2023Updated 2 years ago
- An Extended, Modulair, Host Discovery Framework☆42Jan 22, 2019Updated 7 years ago
- The best way to scan for weak ssh passwords on your network☆619Dec 18, 2023Updated 2 years ago
- Pop shells like a master.☆1,488Apr 2, 2019Updated 6 years ago
- Extract subdomains from SSL certificates in HTTPS sites.☆388Mar 3, 2025Updated 11 months ago
- ☆25Jul 5, 2018Updated 7 years ago
- Web Crawler, Scanner, and Analyzer Framework (Shell-Script based)☆101Jun 20, 2019Updated 6 years ago
- Search for Directory Traversal Vulnerabilities☆458Jan 11, 2026Updated last month
- Tool to deploy a post-exploitation prompt at any time☆320May 28, 2021Updated 4 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆400Nov 12, 2019Updated 6 years ago
- unix wildcard attacks☆137May 25, 2018Updated 7 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆124Jun 22, 2018Updated 7 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Dec 8, 2022Updated 3 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,448Nov 20, 2025Updated 2 months ago
- kernel privilege escalation enumeration and exploitation framework☆700Aug 2, 2018Updated 7 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- ☆20Jan 25, 2019Updated 7 years ago
- Multi Tool Subdomain Enumeration☆724Apr 11, 2021Updated 4 years ago