Telefonica / HashCheck
Ideaslocas Repository
☆37Updated 3 years ago
Alternatives and similar repositories for HashCheck:
Users that are interested in HashCheck are comparing it to the libraries listed below
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- Noob Penetration tester☆11Updated 7 months ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Updated 4 years ago
- OWASP Foundation Web Respository☆35Updated 3 years ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Updated 4 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆17Updated 2 years ago
- Just another vulnerable web application.☆35Updated 5 months ago
- Simple C2 over the Trello API☆37Updated 2 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- A golang tool that uses the dehashed.com API to search for compromised assets.☆8Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆19Updated 4 years ago
- Script to setup a phishing server on the cloud☆12Updated 3 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 9 months ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 3 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 3 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago