☆57Aug 7, 2020Updated 5 years ago
Alternatives and similar repositories for groupenum
Users that are interested in groupenum are comparing it to the libraries listed below
Sorting:
- ☆252Sep 18, 2019Updated 6 years ago
- Checkpoint Firewall Ruleset Auditor ( For the HTML exports when you do not have the object files )☆39Mar 30, 2017Updated 8 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Feb 23, 2015Updated 11 years ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- A Java Server Faces (JSF) testing tool for decoding view state and creating view state attack vectors.☆32Dec 7, 2010Updated 15 years ago
- SQL Injection without the pain of syringes.☆25Apr 20, 2017Updated 8 years ago
- C# SDK for SecureAuth IdP API☆11May 31, 2023Updated 2 years ago
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆63Sep 27, 2012Updated 13 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Aug 9, 2013Updated 12 years ago
- Next generation remote logging tool for ModSecurity, supporting native and JSON format.☆22Jan 29, 2018Updated 8 years ago
- ModSecurity status☆33May 27, 2014Updated 11 years ago
- A PowerShell script for performing a build review of a Windows host☆23Mar 11, 2019Updated 6 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- A variation of the IKE-SCAN user guide's transforms discovery script, adding a few features. Handshakes can be done in Main or Aggressive…☆13Jul 4, 2024Updated last year
- ⚔️ Red Team tools for capturing credentials & planting payloads using native Windows features.☆10Jan 25, 2026Updated last month
- Convert gpsxml files to png files which can be opened in Qgis☆13Aug 16, 2016Updated 9 years ago
- Net::TNS, a Ruby library for connecting to Oracle databases.☆35May 7, 2019Updated 6 years ago
- A collection of code snippets used in blog posts.☆53Aug 29, 2025Updated 6 months ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Nov 13, 2018Updated 7 years ago
- Not another SCA. Lists of interesting regular expressions for searching code for security issues. Think FuzzDB for SCA.☆15Nov 30, 2016Updated 9 years ago
- ☆17Apr 8, 2015Updated 10 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- Python script for dumping firmware from read-back protected nRF51 chips☆14Jan 17, 2018Updated 8 years ago
- LOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses☆63Mar 11, 2016Updated 9 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- Lutech TMS EHAT-NG☆13Jul 8, 2017Updated 8 years ago
- Small scripts to assist in pentesting☆19Feb 2, 2021Updated 5 years ago
- Verification tools for CVE-2016-1287☆33Mar 15, 2017Updated 8 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Dec 6, 2010Updated 15 years ago
- Enumerate RIDs using pure Python☆32Jan 5, 2026Updated last month
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- ☆19Apr 22, 2016Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago