JumpsecLabs / Rook
A tool to Terraform and automate password cracking on AWS.
☆81Updated 5 years ago
Alternatives and similar repositories for Rook:
Users that are interested in Rook are comparing it to the libraries listed below
- Tool to identify routers on the local LAN and paths to the Internet☆63Updated last year
- ☄️ go-out - A Golang egress buster.☆124Updated last year
- A very simple lab to demo some Terraform, DSC, Inspec and Gitlab CI☆89Updated 2 years ago
- Mass target enumeration☆27Updated 3 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆101Updated 5 years ago
- Merge multiple nMap xml files into one☆50Updated 5 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆87Updated 8 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 3 months ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 6 months ago
- ☆41Updated 4 years ago
- This script is a multi-threaded Okta password sprayer.☆70Updated last year
- Lookup for interesting stuff in SMB shares☆149Updated last year
- ☆103Updated 4 months ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- ☆27Updated 4 years ago
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Updated 6 years ago
- Script for generating hostapd-wpe configuration files and spoofed certificates☆46Updated 8 years ago
- ☆68Updated last year
- ☆69Updated 3 years ago
- Fly into Gophish with One Click (Infra Automation)☆46Updated last year
- Collection of hashcat lists and things.☆50Updated 5 years ago
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆34Updated 8 months ago
- POC code to explore phishing attacks using OAuth 2.0 authorization flows, such as the device authorization grant.☆34Updated 3 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- Detect & filter duplicate hashcat rules☆43Updated last month
- Automatic Sender Policy Framework Reconnaissance☆18Updated 6 years ago
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆82Updated 3 months ago
- Resolves an IP address to the cloud provider it is hosted on☆94Updated last month
- Statically Compiled Tools that could be used in engagements☆17Updated 2 years ago
- VHostChecker takes a csv list of targets in the form of domain,ip,port and runs 4 seperate connection checks to get a quick sense of how …☆33Updated last year