JumpsecLabs / RookLinks
A tool to Terraform and automate password cracking on AWS.
☆84Updated 5 years ago
Alternatives and similar repositories for Rook
Users that are interested in Rook are comparing it to the libraries listed below
Sorting:
- Tool to identify routers on the local LAN and paths to the Internet☆65Updated last year
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆81Updated last year
- ☄️ go-out - A Golang egress buster.☆129Updated last year
- ☆115Updated 3 months ago
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆84Updated 7 months ago
- Merges multiple .nessus files into one file.☆45Updated 2 years ago
- ☆38Updated 5 months ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆91Updated last year
- Various scripts and codes☆84Updated 4 years ago
- Protocol agnostic online password guessing API.☆83Updated 2 years ago
- Simple parser framework.☆26Updated 2 years ago
- Fast offline auditing of Active Directory passwords using Python.☆164Updated 11 months ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆104Updated 6 years ago
- ☆70Updated last year
- This script is a multi-threaded Okta password sprayer.☆72Updated last year
- ☆108Updated 3 years ago
- ☆54Updated 4 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆112Updated 2 years ago
- ☆69Updated 3 years ago
- Script for generating hostapd-wpe configuration files and spoofed certificates☆46Updated 8 years ago
- Passive internal reconnaissance tool☆72Updated 2 years ago
- POC code to explore phishing attacks using OAuth 2.0 authorization flows, such as the device authorization grant.☆35Updated 3 years ago
- BloodHound Docker Ready to Use☆89Updated 2 years ago
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- Import Nmap scans to Cherrytree☆37Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 7 months ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- OneRuleToRuleThemAll... hashcat optimised rule☆96Updated 7 months ago