☆153Jun 30, 2023Updated 2 years ago
Alternatives and similar repositories for ipwn
Users that are interested in ipwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Shell script for converting an input file containing one or more sslscan results into HTML tables.☆13Jul 1, 2020Updated 5 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- Simple Distributed IOC Scanner☆12Jul 27, 2015Updated 10 years ago
- lair-docker-compose repo☆17Mar 11, 2021Updated 5 years ago
- An automated SMB relay exploitation script.☆153Oct 11, 2016Updated 9 years ago
- ☆28Apr 4, 2022Updated 3 years ago
- ☆15Apr 27, 2020Updated 5 years ago
- A framework for stealthy domain reconnaissance☆301Oct 14, 2021Updated 4 years ago
- Small scripts to assist in pentesting☆19Feb 2, 2021Updated 5 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 8 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- This repository contains a list of tools that may be useful for consultants performing penetration testing engagements.☆18Oct 11, 2019Updated 6 years ago
- ☆18May 3, 2016Updated 9 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Common Findings Database☆101Jul 25, 2019Updated 6 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆170Mar 7, 2018Updated 8 years ago
- A python based LinkedIn enumeration tool☆571Jul 11, 2023Updated 2 years ago
- ☆189Aug 3, 2024Updated last year
- A simplified SMB Email Client Attack script used for pentests.☆29Jan 31, 2019Updated 7 years ago
- ☆28Feb 11, 2016Updated 10 years ago
- The Credential Mapper☆451Dec 1, 2017Updated 8 years ago
- A tool to abuse Exchange services☆2,302Jun 10, 2024Updated last year
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- myBFF - a Brute Force Framework☆143Mar 4, 2025Updated last year
- Some NSE scripts to search information from routers☆10Nov 18, 2015Updated 10 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆32Jun 23, 2019Updated 6 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Dec 4, 2020Updated 5 years ago
- Verification tools for CVE-2016-1287☆33Mar 15, 2017Updated 9 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆261Aug 6, 2016Updated 9 years ago
- Chameleon: A tool for evading Proxy categorisation☆512Nov 28, 2024Updated last year
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Mar 8, 2019Updated 7 years ago
- Free Email Providers☆11Aug 15, 2023Updated 2 years ago
- PowerShell Pass The Hash Utils☆1,732Dec 9, 2018Updated 7 years ago
- ☆252Sep 18, 2019Updated 6 years ago