MichaelDim02 / Narthex
Modular personalized dictionary generator.
☆199Updated 6 months ago
Alternatives and similar repositories for Narthex:
Users that are interested in Narthex are comparing it to the libraries listed below
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆193Updated 3 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆290Updated 3 years ago
- Zero Infrastructure Password Cracking☆399Updated 5 months ago
- A WLAN red team framework.☆149Updated 4 months ago
- A polyglot payload generator☆239Updated 2 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆227Updated 6 months ago
- 🌯 Give me a web shell, I'll give you a terminal.☆184Updated 3 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆368Updated 2 years ago
- DorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets☆234Updated 3 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆152Updated this week
- Generate obfuscated meterpreter shells☆228Updated 3 years ago
- Automated rogue access point setup tool.☆192Updated 3 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆147Updated 3 years ago
- For pentesters who don't wanna leave their terminals.☆183Updated 3 years ago
- Tool for scan vulnerabilities in Moodle platforms☆92Updated 2 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 3 years ago
- Yet another content discovery tool☆119Updated 3 months ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Updated 2 years ago
- Hash identification program.☆151Updated 3 years ago
- Google Dork File Finder☆191Updated last month
- Simple HTTP listener for security testing☆113Updated 2 months ago
- Wordlists handcrafted (and automated) with ♥☆215Updated 10 months ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 4 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆430Updated last year
- Password Hunter in Active Directory☆197Updated 2 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- ☆145Updated 2 months ago
- ☆410Updated last year
- Rule for hashcat or john. Aiming to crack how people generate their password☆428Updated 5 months ago
- Shell Please 1.0 : Reverse shell code generator.☆35Updated 2 years ago