Jean13 / networking_and_attackingLinks
Networking and attacking scripts.
☆10Updated 8 years ago
Alternatives and similar repositories for networking_and_attacking
Users that are interested in networking_and_attacking are comparing it to the libraries listed below
Sorting:
- Some of the scripts I use.☆41Updated 8 years ago
 - OSCP Scripts☆14Updated 9 years ago
 - An automated SMB relay exploitation script.☆154Updated 9 years ago
 - A scanning tool for the ShellShock bash vulnerability☆34Updated 8 years ago
 - A web interface for Hashcat/oclHashcat☆29Updated 8 years ago
 - A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
 - ☆52Updated 5 years ago
 - Linux pentest tools☆88Updated 5 years ago
 - Python Tool for Host Enumeration☆50Updated 8 years ago
 - Your last stop for password list generation needs!☆27Updated 10 years ago
 - PowerShell Helper Tool☆150Updated 10 years ago
 - Generates a Windows 'vulnerable' machine from ISOs☆91Updated 12 years ago
 - Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Updated 6 years ago
 - Basics of Windows privilege escalation☆134Updated 8 years ago
 - Plugin for keepnote to import a XML nmap file☆27Updated 9 years ago
 - Pivoter is a proxy tool for pentesters to have easier lateral movement.☆143Updated 10 years ago
 - Created on 10th August 2017. Purpose of this Project is to note down every useful object I gained during the time I spent working on OSCP…☆19Updated 7 years ago
 - A ton of helpful tools☆339Updated 4 years ago
 - Automated Responder/secretsdump.py cracking☆187Updated 9 years ago
 - Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆22Updated 5 years ago
 - Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆245Updated 11 years ago
 - Auto Domain Admin and Network Exploitation.☆299Updated 7 years ago
 - ☆244Updated 6 years ago
 - Next Generation Firewall Audit and Bypass Tool☆265Updated 8 years ago
 - Learnings from OSCP and other random stuff.☆31Updated last year
 - 3 tools that work together to simplify reconaissance of Windows File Shares☆169Updated 7 years ago
 - Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆259Updated 9 years ago
 - FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Updated 7 years ago
 - Attack Knowledge Base☆100Updated 8 years ago
 - Materials of Workshop presented at DEFCON 25☆107Updated 8 years ago