An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.
☆40Jun 17, 2024Updated last year
Alternatives and similar repositories for iker
Users that are interested in iker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- Find Inbound Email Domains☆34Dec 21, 2023Updated 2 years ago
- This repository contains a framework of curated Azure penetration testing tools that are specifically designed to help you identify and m…☆23May 13, 2023Updated 2 years ago
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- ☆216Dec 17, 2025Updated 4 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Tool to mount all readable CIFS shares of a remote system locally to a linux system. This allows the use tools like filesystem GUIs, tree…☆16Jul 12, 2023Updated 2 years ago
- ☆46Jun 1, 2025Updated 10 months ago
- Yet Another LinkedIn Scraper☆32Mar 9, 2023Updated 3 years ago
- Bash and ZSH integration for Impacket☆72Nov 6, 2025Updated 5 months ago
- Hooking calls to libssl (openssl) to decrypt ssl traffic☆19Nov 16, 2020Updated 5 years ago
- ☆60Jun 2, 2025Updated 10 months ago
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆47Jul 19, 2022Updated 3 years ago
- Custom Deserializer☆13Feb 1, 2017Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 3 years ago
- This script is a multi-threaded Okta password sprayer.☆71Jan 5, 2024Updated 2 years ago
- Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604)☆17Aug 2, 2024Updated last year
- Modular Enumeration and Password Spraying Framework☆130Apr 10, 2024Updated 2 years ago
- Automatically extracts API Keys from APK files☆14Feb 1, 2022Updated 4 years ago
- User enumeration with Microsoft Teams API☆175Jul 9, 2021Updated 4 years ago
- ☆26Updated this week
- Build sneaky & malicious LNK files.☆161Jul 16, 2025Updated 9 months ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆19Updated this week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Fly into Gophish with One Click (Infra Automation)☆53Mar 30, 2023Updated 3 years ago
- ☆25Jun 13, 2022Updated 3 years ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Aug 29, 2022Updated 3 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- Enumerate and check domains for Azure tenants☆57Feb 1, 2022Updated 4 years ago
- Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for m…☆13Feb 1, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆10Aug 17, 2021Updated 4 years ago
- Generic fuzzing wordlist to test for SQLi. Merged from different SQLi wordlists.☆18Jul 24, 2021Updated 4 years ago
- Publicly-available tools from Rogue Valley Information Security☆14Feb 5, 2025Updated last year
- Check for LDAP protections regarding the relay of NTLM authentication☆531Nov 19, 2024Updated last year
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆206May 11, 2023Updated 2 years ago