Jean13 / networking_and_attackingLinks
Networking and attacking scripts.
☆10Updated 8 years ago
Alternatives and similar repositories for networking_and_attacking
Users that are interested in networking_and_attacking are comparing it to the libraries listed below
Sorting:
- An automated SMB relay exploitation script.☆155Updated 8 years ago
- A scanning tool for the ShellShock bash vulnerability☆34Updated 7 years ago
- Your last stop for password list generation needs!☆27Updated 10 years ago
- A web interface for Hashcat/oclHashcat☆28Updated 8 years ago
- Automates some pentest jobs via nmap xml file☆324Updated 6 years ago
- A ton of helpful tools☆338Updated 3 years ago
- ☆241Updated 5 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆355Updated 2 years ago
- Some of the scripts I use.☆41Updated 8 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆142Updated 10 years ago
- PowerShell Helper Tool☆151Updated 10 years ago
- OSCP Scripts☆14Updated 9 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- ☆52Updated 5 years ago
- Duct Tape Command and Control!☆96Updated last month
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆166Updated 6 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Auto Domain Admin and Network Exploitation.☆299Updated 7 years ago
- A web scraper for generating password files based on plain text found☆127Updated 2 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆243Updated 11 years ago
- Exploits and Security Tools Framework 2.0.1☆306Updated 2 years ago
- ☆26Updated 7 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Updated 7 years ago
- Automated Responder/secretsdump.py cracking☆186Updated 9 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆285Updated 4 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆383Updated 5 years ago
- PowerShell_Popup☆33Updated 10 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 11 years ago
- Various Cheat Sheets related to development and security☆143Updated 5 years ago