TH3xACE / OFFPORT_KILLERLinks
This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan or services running locally. The tool is useful when nmap or any scanning tool is not available and in the situation during which you did a manual port scanning and then want to identify the services running be…
☆52Updated 4 years ago
Alternatives and similar repositories for OFFPORT_KILLER
Users that are interested in OFFPORT_KILLER are comparing it to the libraries listed below
Sorting:
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆58Updated 3 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆101Updated 5 years ago
- Sp00fer blog post -☆26Updated 3 years ago
- ☆33Updated 7 months ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 6 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 9 months ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- wordlists for password cracking☆28Updated 3 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆47Updated 7 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆33Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated 3 weeks ago
- Automated 802.1x Bypass☆85Updated 5 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 6 years ago
- Subdomain Enumeration and Scanner☆33Updated 5 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Updated 9 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆46Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago