NECPC / RedCell-KaliLinks
Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates
☆12Updated 8 years ago
Alternatives and similar repositories for RedCell-Kali
Users that are interested in RedCell-Kali are comparing it to the libraries listed below
Sorting:
- PHP Phishing Framework☆28Updated 11 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Software exploitation training material☆15Updated 8 years ago
- A multi-threaded class C network scanner. Loosely based on propecia.c by Bind.☆12Updated 11 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Specify targets and run sets of tools against them☆11Updated 10 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 3 years ago
- XLSX parser for nessus and nmap scan results.☆13Updated 5 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- Collect hashes password hashes for cracking☆31Updated 11 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- Search bing with python☆12Updated 10 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 7 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 10 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Side Channel script☆25Updated 2 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆11Updated 8 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆30Updated 8 years ago