Telefonica / HashCheck
Ideaslocas Repository
☆37Updated 3 years ago
Alternatives and similar repositories for HashCheck:
Users that are interested in HashCheck are comparing it to the libraries listed below
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Noob Penetration tester☆11Updated 9 months ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 2 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- OWASP Foundation Web Respository☆35Updated 3 years ago
- Searching .evtx logs for remote connections☆24Updated last year
- Simple Live Data Collection Tool☆21Updated 4 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- Create visualization from Shodan query☆72Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Information-Gathering Shell Script☆29Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- A basic proxylogon scanner☆27Updated 3 years ago
- ☆42Updated 2 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Updated 3 years ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Updated 4 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 3 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago