☆252Sep 18, 2019Updated 6 years ago
Alternatives and similar repositories for ikeforce
Users that are interested in ikeforce are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆57Aug 7, 2020Updated 5 years ago
- The IKE Scanner☆413Sep 15, 2024Updated last year
- Easy 802.1Q VLAN Hopping☆390Feb 24, 2016Updated 10 years ago
- Verification tools for CVE-2016-1287☆33Mar 15, 2017Updated 9 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Dec 6, 2010Updated 15 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆226Dec 29, 2015Updated 10 years ago
- lair-docker-compose repo☆17Mar 11, 2021Updated 5 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆370Jul 30, 2024Updated last year
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- Various scripts for penetration testing☆156Dec 13, 2025Updated 3 months ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,937Nov 19, 2025Updated 4 months ago
- Easy 802.1Q VLAN Hopping☆80Jul 23, 2024Updated last year
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,317Nov 22, 2022Updated 3 years ago
- blacksheepwall is a hostname reconnaissance tool☆300Apr 25, 2020Updated 5 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆66May 16, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Smart Install Exploitation Tool☆594Dec 21, 2021Updated 4 years ago
- IPSec testing tool☆19Oct 19, 2024Updated last year
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- Windows Offline Common Password Hash Checker☆29Aug 9, 2016Updated 9 years ago
- SpiderLabs shared Nmap Tools☆231Aug 7, 2020Updated 5 years ago
- A tool to abuse Exchange services☆2,303Jun 10, 2024Updated last year
- ☆28Apr 4, 2022Updated 4 years ago
- Snarf man-in-the-middle / relay suite☆206Oct 7, 2016Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆383Mar 10, 2020Updated 6 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Aug 29, 2022Updated 3 years ago
- LinkedInt: A LinkedIn scraper for reconnaissance during adversary simulation☆491May 23, 2023Updated 2 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,651Oct 11, 2018Updated 7 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago