A variation of the IKE-SCAN user guide's transforms discovery script, adding a few features. Handshakes can be done in Main or Aggressive Modes. For Aggresive Mode, a custom group ID can be given. Targets can be specified as a single IP, or an input file of multiple IPs.
☆13Jul 4, 2024Updated last year
Alternatives and similar repositories for ike-trans
Users that are interested in ike-trans are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- In our project we are proposing a real time de-noising algorithm for audio signals based on the Wavelet Transform. White noise is omnipre…☆21Feb 12, 2021Updated 5 years ago
- ☆12Jan 27, 2024Updated 2 years ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- Self delete DLL (2)☆14Feb 15, 2024Updated 2 years ago
- Dradis API Python Wrapper☆13Mar 19, 2024Updated 2 years ago
- My customized docker image used for binary exploitation and RE☆14Jul 3, 2021Updated 4 years ago
- Deliberately insecure Kubernetes test clusters built using kind☆13Aug 16, 2019Updated 6 years ago
- A pwning environment, now on docker!☆18Jul 3, 2021Updated 4 years ago
- Repository for Ludus french templates☆23Mar 1, 2026Updated 3 weeks ago
- Cobalt Strike random C2 Profile generator☆16Mar 4, 2026Updated 2 weeks ago
- Implementation of Anticipatory Learning Classifiers System (ALCS) in Python☆12May 31, 2023Updated 2 years ago
- BMC Bladelogic RSCD exploits including remote code execution - CVE-2016-1542, CVE-2016-1543, CVE-2016-5063☆20Apr 17, 2020Updated 5 years ago
- Volvo P2 (S60) RTI retrofit with Android Auto, Carplay, Handsfree etc.☆19Sep 29, 2025Updated 5 months ago
- This code was used for the blogpost on secjuice.☆43Apr 17, 2019Updated 6 years ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- Docker container for running CobaltStrike 4.7 and above☆24Mar 20, 2025Updated last year
- Simply insert your Yubikey and connect automatically to your TOTP-2FA-VPN.☆16Nov 19, 2025Updated 4 months ago
- collection of pentest tools☆26Aug 4, 2019Updated 6 years ago
- 📩 Simple Docker image that runs imap-backup with crontab☆13Jan 14, 2023Updated 3 years ago
- LDAP Swiss Army Knife☆51Dec 5, 2023Updated 2 years ago
- Enumerate the Domain for Readable and Writable Shares☆23Nov 14, 2025Updated 4 months ago
- ☆20Jan 26, 2022Updated 4 years ago
- ☆18Dec 12, 2020Updated 5 years ago
- Run PowerShell command without invoking powershell.exe☆35Nov 22, 2021Updated 4 years ago
- Memcached session store for Connect backed by memjs☆13Nov 14, 2022Updated 3 years ago
- This is a simple Thunderbird extension (compatible with Thunderbird 78+ as of January 2021) that allows editing notes created, edited and…☆24Mar 17, 2022Updated 4 years ago
- ☆24Jul 15, 2023Updated 2 years ago
- Keystroke injection tool collection for 2.4 GHz wireless input devices☆24Oct 20, 2023Updated 2 years ago
- A simple script to make network namespaces more usable☆23Oct 18, 2019Updated 6 years ago
- Verification tools for CVE-2016-1287☆33Mar 15, 2017Updated 9 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- ☆13Jul 30, 2021Updated 4 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- Gets in the way of your victim's traffic and out of yours☆27Aug 4, 2019Updated 6 years ago
- This python script reads Instagram's JSON export file (messages.json) and prints in a user readable format☆20Aug 30, 2021Updated 4 years ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 9 months ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago