Karma1331 / Target-Enumeration
nmap -> searchploit -> GoBuster/Eyewitness & LDAPsearch & SMBclient & Showmount
☆20Updated 4 years ago
Alternatives and similar repositories for Target-Enumeration:
Users that are interested in Target-Enumeration are comparing it to the libraries listed below
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 2 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Google Chrome Extension automates testing fundamental Web Problems via Chrome☆21Updated 3 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆15Updated 3 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- Noob Penetration tester☆11Updated 9 months ago
- ☆14Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 10 months ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- CVE-2020-5902☆9Updated 4 years ago
- ☆14Updated 5 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 6 years ago
- Notes and helper scripts/files/etc from when I passed my OSCP☆18Updated 5 years ago
- Exploits developped by Outflank B.V. team members☆20Updated 8 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 3 years ago
- ☆17Updated last year
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Updated 4 years ago
- Secrets detection based on regular expressions.☆23Updated last year
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Updated 4 years ago
- ☆20Updated 5 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 4 years ago