☆252Sep 18, 2019Updated 6 years ago
Alternatives and similar repositories for ikeforce
Users that are interested in ikeforce are comparing it to the libraries listed below
Sorting:
- ☆57Aug 7, 2020Updated 5 years ago
- The IKE Scanner☆408Sep 15, 2024Updated last year
- Easy 802.1Q VLAN Hopping☆390Feb 24, 2016Updated 10 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆226Dec 29, 2015Updated 10 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Dec 6, 2010Updated 15 years ago
- Verification tools for CVE-2016-1287☆33Mar 15, 2017Updated 8 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆366Jul 30, 2024Updated last year
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- Various scripts for penetration testing☆156Dec 13, 2025Updated 2 months ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,309Nov 22, 2022Updated 3 years ago
- Easy 802.1Q VLAN Hopping☆80Jul 23, 2024Updated last year
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,913Nov 19, 2025Updated 3 months ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Smart Install Exploitation Tool☆594Dec 21, 2021Updated 4 years ago
- Various Cheat Sheets☆183Jun 24, 2021Updated 4 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- An automated SMB relay exploitation script.☆153Oct 11, 2016Updated 9 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- IPSec testing tool☆19Oct 19, 2024Updated last year
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- ☆28Apr 4, 2022Updated 3 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆957Nov 18, 2020Updated 5 years ago
- SpiderLabs shared Nmap Tools☆230Aug 7, 2020Updated 5 years ago
- Windows Offline Common Password Hash Checker☆29Aug 9, 2016Updated 9 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Feb 23, 2015Updated 11 years ago
- Snarf man-in-the-middle / relay suite☆206Oct 7, 2016Updated 9 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago
- Rid_enum is a null session RID cycle attack for brute forcing domain controllers.☆308Jul 28, 2024Updated last year
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆63Sep 27, 2012Updated 13 years ago
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,505Aug 1, 2023Updated 2 years ago
- A tool to abuse Exchange services☆2,300Jun 10, 2024Updated last year
- Responder Windows Version Beta☆557Jul 30, 2024Updated last year