Karma1331 / Target-Enumeration
nmap -> searchploit -> GoBuster/Eyewitness & LDAPsearch & SMBclient & Showmount
☆20Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Target-Enumeration
- Google Chrome Extension automates testing fundamental Web Problems via Chrome☆21Updated 3 years ago
- A collection of OSCE preparation resources.☆23Updated 5 years ago
- Scripts for OSCE☆18Updated 5 years ago
- Noob Penetration tester☆10Updated 5 months ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 7 months ago
- Basic Binary Exploitation / Buffer Overflows☆11Updated 7 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆15Updated last year
- Pythonize Intruder Payload☆13Updated 3 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- Bug Bounty Clipboard☆17Updated 5 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 4 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 2 years ago
- Simple C2 over the Trello API☆37Updated last year
- Any presentation we've given at FortyNorth Security☆33Updated 3 years ago
- Subdomain Enumeration and Scanner☆32Updated 4 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Updated 2 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- ☆12Updated 3 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated last year
- ☆14Updated 3 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆19Updated 2 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- Principles and commands for penetration testing and OSCP☆9Updated 4 years ago
- A tool to run nmap against each line in a script.☆16Updated 3 years ago
- ☆14Updated 4 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆28Updated 6 years ago