InnotecSystem / meatLinks
Tool to automate the whole process of environment in android audits
☆14Updated 6 years ago
Alternatives and similar repositories for meat
Users that are interested in meat are comparing it to the libraries listed below
Sorting:
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Updated 6 years ago
- Rogue Access Point Detector☆36Updated last year
- Creates dictionaries based on Wikipedia titles☆62Updated 6 years ago
- Linux Local Privesc Helper and Agent☆166Updated 6 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 7 years ago
- A ping detection tool for linux☆24Updated 5 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 3 years ago
- ☆21Updated 8 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆67Updated 3 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Updated 5 years ago
- A collection of my Dockerfiles☆90Updated 3 years ago
- ☆78Updated 8 years ago
- Scripts to control an "OSCP-like" lab environment.☆23Updated 8 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆39Updated 6 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆102Updated 2 years ago
- Samba, NFS shares spider and grepper☆71Updated 7 years ago
- An epic web shell☆85Updated 7 months ago
- Password spraying script and helper for creating password lists☆34Updated 5 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆142Updated 3 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆113Updated last year
- Red Team Resources☆60Updated 7 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆128Updated 7 years ago
- Graph visualization of wireless client and access point relationships☆117Updated 3 years ago
- ☆106Updated 4 years ago
- Password Guessing for different Web Portals☆29Updated 7 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 7 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Updated 11 years ago
- Automated 802.1x Bypass☆86Updated 5 years ago