Telefonica / HashCheck
Ideaslocas Repository
☆37Updated 3 years ago
Related projects: ⓘ
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 3 years ago
- Noob Penetration tester☆10Updated 4 months ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 5 months ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 3 years ago
- Simple C2 over the Trello API☆37Updated last year
- OWASP Foundation Web Respository☆35Updated 3 years ago
- A simple program to query nmap xml files in the terminal.☆26Updated 4 years ago
- Just another vulnerable web application.☆35Updated last month
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 2 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- ☆29Updated this week
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- Small python script wrapper for automating hashcat commands☆32Updated 3 years ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆32Updated 9 months ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- Shell hunter for AF☆34Updated 2 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆41Updated last year
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆18Updated 4 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆12Updated last year
- Post-exploitation tool for attacking Active Directory domain controllers☆15Updated last year
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 4 years ago
- Central IoC scanner based on Loki☆20Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆37Updated 2 years ago
- A rogue DNS detector☆23Updated 11 months ago