MichaelDim02 / Narthex
Modular personalized dictionary generator.
☆203Updated 7 months ago
Alternatives and similar repositories for Narthex:
Users that are interested in Narthex are comparing it to the libraries listed below
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆193Updated 3 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆291Updated 3 years ago
- Hash identification program.☆152Updated 3 years ago
- A WLAN red team framework.☆151Updated 5 months ago
- Zero Infrastructure Password Cracking☆401Updated 7 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆154Updated last week
- A targeted DNS cache poisoner☆117Updated 2 years ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆384Updated 3 years ago
- For pentesters who don't wanna leave their terminals.☆183Updated 3 years ago
- [EN] BETA: Layla - recon tool for bug bounty☆76Updated 3 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆227Updated 7 months ago
- A tool for generating reverse shell payloads on the fly.☆140Updated 2 years ago
- Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered fo…☆196Updated 2 years ago
- a fast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust☆347Updated 3 years ago
- Rule for hashcat or john. Aiming to crack how people generate their password☆430Updated 6 months ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆103Updated last year
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆121Updated 4 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆96Updated last year
- A polyglot payload generator☆239Updated 2 years ago
- Automated rogue access point setup tool.☆194Updated 3 years ago
- Simple HTTP listener for security testing☆113Updated 4 months ago
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 3 years ago
- Turn PuTTY into an SSH login bruteforcing tool.☆283Updated 4 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆371Updated 2 years ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆429Updated last year
- Wordlists handcrafted (and automated) with ♥☆215Updated 2 weeks ago
- Google Dork File Finder☆193Updated 2 months ago
- A WPA3 dictionary cracker☆317Updated last year
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago