al1ce23 / NSA-Playset
Mirror of the NSA Playset Project
☆35Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for NSA-Playset
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆33Updated 2 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆28Updated 3 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated last year
- Small python script wrapper for automating hashcat commands☆34Updated 3 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆50Updated 2 years ago
- Wireless Pentesting Device☆19Updated 4 years ago
- Nexus of Android banking Trojans☆15Updated last year
- Hashes of infamous malware☆25Updated last year
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆12Updated 9 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 3 weeks ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated last year
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆52Updated last year
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆25Updated 4 years ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆10Updated 4 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆25Updated last year
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆10Updated 2 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 4 years ago
- ☆37Updated 3 years ago
- Ansible playbooks for the Seclab project☆12Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated 4 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆22Updated last year
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- Dehashed API CLI☆18Updated 4 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆58Updated 4 years ago
- Forensic Imaging quickstarts!☆13Updated 2 years ago
- Miscellaneous tools for BloodHound☆18Updated 2 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆11Updated 4 years ago
- Some useful scripts for CobaltStrike☆10Updated 5 years ago
- ☆16Updated 2 years ago
- random scripts and utilities used for pentesting or R&D purposes☆9Updated 7 months ago