An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.
☆40Jun 17, 2024Updated last year
Alternatives and similar repositories for iker
Users that are interested in iker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- This repository contains a framework of curated Azure penetration testing tools that are specifically designed to help you identify and m…☆22May 13, 2023Updated 2 years ago
- Find Inbound Email Domains☆34Dec 21, 2023Updated 2 years ago
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- ☆216Dec 17, 2025Updated 3 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆44Jun 1, 2025Updated 9 months ago
- Tool to mount all readable CIFS shares of a remote system locally to a linux system. This allows the use tools like filesystem GUIs, tree…☆16Jul 12, 2023Updated 2 years ago
- Yet Another LinkedIn Scraper☆33Mar 9, 2023Updated 3 years ago
- Bash and ZSH integration for Impacket☆72Nov 6, 2025Updated 4 months ago
- ☆60Jun 2, 2025Updated 9 months ago
- Hooking calls to libssl (openssl) to decrypt ssl traffic☆19Nov 16, 2020Updated 5 years ago
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆47Jul 19, 2022Updated 3 years ago
- Custom Deserializer☆13Feb 1, 2017Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 2 years ago
- This script is a multi-threaded Okta password sprayer.☆71Jan 5, 2024Updated 2 years ago
- Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604)☆17Aug 2, 2024Updated last year
- Modular Enumeration and Password Spraying Framework☆128Apr 10, 2024Updated last year
- Automatically extracts API Keys from APK files☆13Feb 1, 2022Updated 4 years ago
- User enumeration with Microsoft Teams API☆175Jul 9, 2021Updated 4 years ago
- ☆25Updated this week
- Build sneaky & malicious LNK files.☆161Jul 16, 2025Updated 8 months ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆19Mar 22, 2026Updated last week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Fly into Gophish with One Click (Infra Automation)☆52Mar 30, 2023Updated 2 years ago
- ☆25Jun 13, 2022Updated 3 years ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Aug 29, 2022Updated 3 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- Enumerate and check domains for Azure tenants☆57Feb 1, 2022Updated 4 years ago
- Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for m…☆12Feb 1, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Generic fuzzing wordlist to test for SQLi. Merged from different SQLi wordlists.☆17Jul 24, 2021Updated 4 years ago
- Publicly-available tools from Rogue Valley Information Security☆14Feb 5, 2025Updated last year
- Check for LDAP protections regarding the relay of NTLM authentication☆530Nov 19, 2024Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆207May 11, 2023Updated 2 years ago
- Bruteforce Keepass databases (KDBX 4.x format)☆144Jul 16, 2024Updated last year
- Scripts that automate portions of pentests.☆58Mar 18, 2026Updated last week