☆252Sep 18, 2019Updated 6 years ago
Alternatives and similar repositories for ikeforce
Users that are interested in ikeforce are comparing it to the libraries listed below
Sorting:
- ☆57Aug 7, 2020Updated 5 years ago
- The IKE Scanner☆411Sep 15, 2024Updated last year
- Easy 802.1Q VLAN Hopping☆390Feb 24, 2016Updated 10 years ago
- Verification tools for CVE-2016-1287☆33Mar 15, 2017Updated 9 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Dec 6, 2010Updated 15 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆226Dec 29, 2015Updated 10 years ago
- lair-docker-compose repo☆17Mar 11, 2021Updated 5 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆368Jul 30, 2024Updated last year
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- Various scripts for penetration testing☆156Dec 13, 2025Updated 3 months ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,924Nov 19, 2025Updated 4 months ago
- Easy 802.1Q VLAN Hopping☆80Jul 23, 2024Updated last year
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,314Nov 22, 2022Updated 3 years ago
- blacksheepwall is a hostname reconnaissance tool☆300Apr 25, 2020Updated 5 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆66May 16, 2024Updated last year
- Smart Install Exploitation Tool☆594Dec 21, 2021Updated 4 years ago
- IPSec testing tool☆19Oct 19, 2024Updated last year
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- Windows Offline Common Password Hash Checker☆29Aug 9, 2016Updated 9 years ago
- SpiderLabs shared Nmap Tools☆231Aug 7, 2020Updated 5 years ago
- A tool to abuse Exchange services☆2,302Jun 10, 2024Updated last year
- ☆28Apr 4, 2022Updated 3 years ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆383Mar 10, 2020Updated 6 years ago
- Snarf man-in-the-middle / relay suite☆206Oct 7, 2016Updated 9 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Aug 29, 2022Updated 3 years ago
- LinkedInt: A LinkedIn scraper for reconnaissance during adversary simulation☆488May 23, 2023Updated 2 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,649Oct 11, 2018Updated 7 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago