An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.
☆40Jun 17, 2024Updated last year
Alternatives and similar repositories for iker
Users that are interested in iker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 5 years ago
- Find Inbound Email Domains☆34Dec 21, 2023Updated 2 years ago
- This repository contains a framework of curated Azure penetration testing tools that are specifically designed to help you identify and m…☆23May 13, 2023Updated 2 years ago
- Used to get NTLMv2 Hashes from SMB☆24Oct 24, 2024Updated last year
- ☆217Dec 17, 2025Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Tool to mount all readable CIFS shares of a remote system locally to a linux system. This allows the use tools like filesystem GUIs, tree…☆16Jul 12, 2023Updated 2 years ago
- ☆46Jun 1, 2025Updated 11 months ago
- Yet Another LinkedIn Scraper☆33Mar 9, 2023Updated 3 years ago
- Bash and ZSH integration for Impacket☆73Nov 6, 2025Updated 6 months ago
- ☆60Jun 2, 2025Updated 11 months ago
- Hooking calls to libssl (openssl) to decrypt ssl traffic☆19Nov 16, 2020Updated 5 years ago
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆46Jul 19, 2022Updated 3 years ago
- Custom Deserializer☆13Feb 1, 2017Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 3 years ago
- This script is a multi-threaded Okta password sprayer.☆72Jan 5, 2024Updated 2 years ago
- Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604)☆17Aug 2, 2024Updated last year
- Modular Enumeration and Password Spraying Framework☆130Apr 10, 2024Updated 2 years ago
- Automatically extracts API Keys from APK files☆14Feb 1, 2022Updated 4 years ago
- User enumeration with Microsoft Teams API☆175Jul 9, 2021Updated 4 years ago
- Build sneaky & malicious LNK files.☆160Jul 16, 2025Updated 9 months ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆19Apr 26, 2026Updated last week
- Fly into Gophish with One Click (Infra Automation)☆53Mar 30, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆25Jun 13, 2022Updated 3 years ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- ☆27Apr 14, 2026Updated 3 weeks ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Aug 29, 2022Updated 3 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 10 years ago
- Enumerate and check domains for Azure tenants☆57Feb 1, 2022Updated 4 years ago
- Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for m…☆13Feb 1, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Generic fuzzing wordlist to test for SQLi. Merged from different SQLi wordlists.☆18Jul 24, 2021Updated 4 years ago
- Publicly-available tools from Rogue Valley Information Security☆14Feb 5, 2025Updated last year
- Check for LDAP protections regarding the relay of NTLM authentication☆531Nov 19, 2024Updated last year
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- Browser extension that extracts users from LinkedIn company pages☆167Apr 24, 2023Updated 3 years ago
- Bruteforce Keepass databases (KDBX 4.x format)☆151Jul 16, 2024Updated last year