ajackal / ideal-alligatorView external linksLinks
PowerShell script to retreive wifi ESSIDs and Passwords.
☆26Jul 28, 2017Updated 8 years ago
Alternatives and similar repositories for ideal-alligator
Users that are interested in ideal-alligator are comparing it to the libraries listed below
Sorting:
- An 802.11 probe request and beacon sniffer.☆14Mar 16, 2021Updated 4 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆29Jun 5, 2017Updated 8 years ago
- PowerShell scripts for setting up a new Windows 10 machine.☆14Dec 12, 2018Updated 7 years ago
- Starts an ngrok TCP tunnel and notifies you of the URL. Perfect for automated remote SSH connections.☆14Jan 24, 2021Updated 5 years ago
- port scanner & login credential tester☆15Mar 25, 2019Updated 6 years ago
- Highlight Burp proxy requests made by different browsers☆29Sep 21, 2017Updated 8 years ago
- Bluetooth device and service discovery tool that can be used for security assessment and penetration testing☆16Dec 15, 2015Updated 10 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- Dockerfile for AFL++ and helpful other tools☆21May 5, 2020Updated 5 years ago
- This repository holds a target infrastructure you can use for running the nimbostratus tools.☆24Mar 9, 2015Updated 10 years ago
- A vulnerable LDAP based web app written in Golang☆83Oct 31, 2023Updated 2 years ago
- Testing tools for Oracle Forms☆45May 27, 2023Updated 2 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Apr 19, 2017Updated 8 years ago
- Provides an overview of the inner file structure of a PDF☆25Sep 26, 2022Updated 3 years ago
- ☆34Aug 23, 2022Updated 3 years ago
- This is a small extension to make graphql readable☆30Dec 14, 2018Updated 7 years ago
- Bash script to bruteforce snmpv3 authentication passwords using MD5 (usmHMACMD5AuthProtocol)☆32Nov 23, 2018Updated 7 years ago
- ☆30May 23, 2017Updated 8 years ago
- Credit to Helge Klein - https://helgeklein.com/blog/2015/02/creating-realistic-test-user-accounts-active-directory/☆69Apr 18, 2018Updated 7 years ago
- The Minimalistic x86/x64 API Hooking Library for Windows☆34Mar 27, 2018Updated 7 years ago
- A C# implementation of the PowerShell Empire Agent☆74Apr 22, 2019Updated 6 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Feb 21, 2020Updated 5 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62May 8, 2017Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Jun 14, 2021Updated 4 years ago
- Prototypes from the GOV.UK Forms team in the Government Digital Service.☆10Dec 9, 2025Updated 2 months ago
- Talos is.☆15Sep 23, 2025Updated 4 months ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- Rust bindings to aubio☆11Apr 13, 2020Updated 5 years ago
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- Kill Chain Matrix -->>☆38Jun 17, 2019Updated 6 years ago
- Automated forensics written in PowerShell☆34Sep 29, 2019Updated 6 years ago
- Experiments in trying to find 0-days in numpy☆38Jul 1, 2017Updated 8 years ago
- Metasploit Framework with Viproy installed.☆36Mar 15, 2017Updated 8 years ago
- A PowerShell module to generate an as built report on the configuration of VEEAM Backup & Replication Infrastructure.☆11Jan 29, 2026Updated 2 weeks ago
- ActionScript3 dynamic instrumentation tool☆36Mar 15, 2017Updated 8 years ago
- Bot to bypass instagram block feature☆10Jun 21, 2017Updated 8 years ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago