nmap -> searchploit -> GoBuster/Eyewitness & LDAPsearch & SMBclient & Showmount
☆21Apr 26, 2020Updated 5 years ago
Alternatives and similar repositories for Target-Enumeration
Users that are interested in Target-Enumeration are comparing it to the libraries listed below
Sorting:
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- A simple DNS exfiltration script☆11Apr 17, 2023Updated 2 years ago
- Quick script to find info about a syscall in a target architecture☆18Jan 8, 2020Updated 6 years ago
- A collection of XSS Attack vectors☆10Apr 26, 2025Updated 10 months ago
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- Mini recon script to identify the links and sensitive information from a particular link☆22Mar 9, 2021Updated 5 years ago
- A compilation of customizations for Debian-based Linux distrubutions (mostly Pop!_OS and Kali Linux) and (finally) a mostly automated scr…☆18Jan 1, 2026Updated 2 months ago
- Endpoint monitor tool☆21Sep 16, 2020Updated 5 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Jul 29, 2016Updated 9 years ago
- InstantCrack es un motor de recuperación de hashes de alto rendimiento diseñado para realizar búsquedas instantáneas en bases de datos pr…☆25Jan 19, 2026Updated 2 months ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 6 years ago
- Tools to make life easier ^_^☆13Aug 21, 2025Updated 7 months ago
- ☆12Mar 27, 2024Updated last year
- Open source alternative to Burpsuite☆16May 18, 2021Updated 4 years ago
- Script to show info on AD computers, and show what switch ports they are plugged into☆20Jul 13, 2020Updated 5 years ago
- the collection of all useful extensions that are used in web hacking & Bug Bounty Hunting☆13Sep 4, 2023Updated 2 years ago
- USB-Rubber-Ducky-Arduino-New-Payloads☆14Oct 26, 2018Updated 7 years ago
- "oh god there are like a million different kinds of analyses, quickly remind me what this one means?"☆19Dec 23, 2020Updated 5 years ago
- KCSEC Rubber Ducky Tookit☆11Jul 12, 2018Updated 7 years ago
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- Secure SSH server using onion service.☆19Nov 1, 2016Updated 9 years ago
- Vagrant file and scripting for easy, disposable Kali Linux virtualization☆23Nov 8, 2019Updated 6 years ago
- WAF Cookie Fetcher is a Burp Suite extension written in Python, which uses a headless browser to obtain the values of WAF-injected cookie…☆16Jan 16, 2018Updated 8 years ago
- Examples of vulnerable PHP code☆12Feb 15, 2024Updated 2 years ago
- Ansible playbooks for configuring and managing Splunk Cloud deployments with the Admin Config Service (ACS) API☆29Feb 25, 2026Updated 3 weeks ago
- ☆36Jan 22, 2025Updated last year
- One liner regex match to search inside JS files, using curl and grep!☆29Dec 26, 2021Updated 4 years ago
- It is a Python+Perl script to exploit ASP.net Padding Oracle vulnerability.