Network-Wizard-Money-Gang / EchosounderLinks
petit programme marrant
☆30Updated 2 months ago
Alternatives and similar repositories for Echosounder
Users that are interested in Echosounder are comparing it to the libraries listed below
Sorting:
- ☆55Updated last year
- Check robustness of your (their) Active Directory accounts passwords☆45Updated 9 months ago
- Lastest Hashcat rules for password cracking☆58Updated 2 weeks ago
- Cheat sheet to detect and remove linux kernel rootkit☆74Updated last year
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Updated 2 weeks ago
- All kinds of tiny shells☆65Updated 2 years ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆62Updated 5 months ago
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆27Updated last year
- EvilMist is a collection of scripts and utilities designed to support cloud penetration testing & red teaming. The toolkit helps identify…☆64Updated 2 weeks ago
- Bitpixie exploitation PoC☆84Updated last month
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆140Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆133Updated 4 months ago
- A volatility 2 docker for forensic investigations☆24Updated 3 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆124Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆156Updated 10 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆33Updated 11 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆75Updated last week
- IPSpinner works as a local proxy that redirects requests through external services.☆112Updated 9 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated last year
- Collection of steganography tools for images and text☆41Updated 2 years ago
- ☆23Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 5 months ago
- Tools for offensive security of NetBackup infrastructures☆42Updated 2 years ago
- ☆93Updated this week
- French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.☆71Updated last month
- ☆36Updated last year
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Updated 11 months ago
- Detonate malware on VMs and get logs & detection status☆73Updated this week
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆52Updated 3 months ago