ShadowHatesYou / pipetap.sh
This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark
☆101Updated 5 years ago
Related projects: ⓘ
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆254Updated 3 years ago
- Automatic firewall rule orchestator.☆82Updated 6 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆107Updated 6 years ago
- ☆142Updated this week
- Feed the tool a .nessus file and it will automatically get you MSF shell☆232Updated last year
- Very crude and poorly written HTTP(s) and SMTP bin☆92Updated 3 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- Pypykatz server☆124Updated 5 years ago
- A testing framework for mail security and filtering solutions.☆244Updated last year
- ☆286Updated this week
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆122Updated 6 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆160Updated 4 years ago
- NebulousAD automated credential auditing tool.☆155Updated 4 years ago
- A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem☆101Updated 5 years ago
- Stop searching for sample hashes on 10 different sites.☆65Updated 6 years ago
- A tool to speed up the process of doing the same simple IP/Domain Name lookups over and over again.☆66Updated 5 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆158Updated last year
- cracke-dit ("Cracked It") makes it easier to perform regular password audits against Active Directory environments.☆111Updated last year
- Network share sniffer and auto-mounter for crawling remote file systems☆200Updated 2 years ago
- A bunch of useful SSH tools for powershell☆118Updated 5 years ago
- Nix Audit made easier (RHEL, CentOS)☆66Updated 3 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆6Updated 5 years ago
- Test a network's egress controls with various levels of success and failure.☆101Updated 2 years ago
- ☆230Updated this week
- A framework for stealthy domain reconnaissance☆292Updated 2 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆390Updated 4 years ago
- DomainCheck is designed to assist operators with monitoring changes related to their domain names. This includes negative changes in cate…☆230Updated 5 years ago
- Rogue AP killer☆86Updated 6 years ago
- ☆133Updated this week