Keramas / Blowhole
Docker auditing and enumeration script.
☆22Updated 5 years ago
Alternatives and similar repositories for Blowhole:
Users that are interested in Blowhole are comparing it to the libraries listed below
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- Forked and updated with some additional features over the original☆16Updated 3 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 6 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 6 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- Docker Version of Aquatone☆13Updated 6 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 10 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 7 years ago
- A parser to extract information from .nessus file format☆23Updated 4 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 10 years ago
- ☆16Updated 7 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 6 years ago
- ☆20Updated 5 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆32Updated 6 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆24Updated 4 months ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆59Updated 6 years ago
- Cobalt Strike log state tracking, parsing, and storage☆23Updated 5 years ago
- WStalker: an easy proxy☆25Updated 4 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Automated deployment and configuration of a Mythic server using Terraform and Ansible☆9Updated last year
- AV Bypass☆29Updated 7 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 5 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago