MichaelDim02 / Narthex
Modular personalized dictionary generator.
☆192Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for Narthex
- Zero Infrastructure Password Cracking☆394Updated 3 months ago
- A polyglot payload generator☆239Updated 2 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆192Updated 2 years ago
- Turn PuTTY into an SSH login bruteforcing tool.☆283Updated 4 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆285Updated 3 years ago
- DorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets☆233Updated 3 years ago
- Hash identification program.☆151Updated 2 years ago
- A WLAN red team framework.☆142Updated last month
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆223Updated 3 months ago
- Meterpreter Reverse shell over TOR network using hidden services☆89Updated 3 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆146Updated 3 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆148Updated this week
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆368Updated 3 years ago
- Automated rogue access point setup tool.☆192Updated 3 years ago
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆201Updated 4 months ago
- A very fast and smart web directory and file enumeration tool written in C.☆135Updated 4 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆82Updated 2 years ago
- An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to he…☆227Updated 2 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆291Updated last year
- Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered fo…☆195Updated last year
- Password Hunter in Active Directory☆196Updated last year
- For pentesters who don't wanna leave their terminals.☆183Updated 3 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆424Updated last year
- Bash script to check for CVE-2022-0847 "Dirty Pipe"☆64Updated last year
- A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python☆198Updated 3 years ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆84Updated last year
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆59Updated 3 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆117Updated 4 months ago
- a fast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust☆330Updated 3 years ago