Network-Wizard-Money-Gang / EchosounderLinks
petit programme marrant
☆30Updated 2 months ago
Alternatives and similar repositories for Echosounder
Users that are interested in Echosounder are comparing it to the libraries listed below
Sorting:
- Check robustness of your (their) Active Directory accounts passwords☆45Updated 10 months ago
- ☆55Updated last year
- A public, open source physical security methodology☆47Updated last year
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆62Updated 6 months ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆139Updated last year
- IPSpinner works as a local proxy that redirects requests through external services.☆112Updated 9 months ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84Updated 7 months ago
- Lastest Hashcat rules for password cracking☆61Updated last week
- CaptainCredz is a modular and discreet password-spraying tool.☆133Updated 5 months ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Updated last month
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆156Updated 10 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆34Updated last year
- ☆34Updated 2 years ago
- Artifact monitoring that ensures fairplay☆78Updated 11 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 6 months ago
- A volatility 2 docker for forensic investigations☆24Updated 4 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated last year
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆17Updated 6 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆125Updated 2 weeks ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆52Updated 10 months ago
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆75Updated last year
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago
- tool for identifying guest relationships between companies☆103Updated last year
- Bitpixie exploitation PoC☆88Updated 2 months ago
- ☆36Updated last year
- LinkedIn recon the easy way☆109Updated 6 months ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆39Updated 11 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆77Updated last year
- A user enumeration tool for Slack.☆34Updated last year