Telefonica / HashCheck
Ideaslocas Repository
☆37Updated 3 years ago
Alternatives and similar repositories for HashCheck:
Users that are interested in HashCheck are comparing it to the libraries listed below
- Central IoC scanner based on Loki☆20Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Noob Penetration tester☆11Updated 10 months ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- OWASP Foundation Web Respository☆35Updated 3 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- Information-Gathering Shell Script☆29Updated 4 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 2 years ago
- Just another vulnerable web application.☆35Updated 8 months ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- ☆47Updated 4 years ago
- Collaborative pentest tool with highly customizable tools☆72Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago