apuentemedallia / tools-and-techniques-for-vulnerability-validationLinks
☆21Updated 8 years ago
Alternatives and similar repositories for tools-and-techniques-for-vulnerability-validation
Users that are interested in tools-and-techniques-for-vulnerability-validation are comparing it to the libraries listed below
Sorting:
- Password spraying script and helper for creating password lists☆34Updated 5 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆77Updated 11 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 7 years ago
- Script for generating hostapd-wpe configuration files and spoofed certificates☆46Updated 8 years ago
- Samba, NFS shares spider and grepper☆71Updated 7 years ago
- AWS S3 Bucket/Object Finder☆25Updated 8 years ago
- Reconnaissance tool for Microsoft Office 365☆69Updated 7 years ago
- Scripts to control an "OSCP-like" lab environment.☆23Updated 8 years ago
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆85Updated last year
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆41Updated 4 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆71Updated 3 years ago
- Responsive Command and Control System☆102Updated 3 years ago
- A tool to abuse Exchange services☆18Updated 6 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Updated 6 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆67Updated last year
- ☆78Updated 8 years ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆32Updated 7 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆113Updated last year
- An epic web shell☆85Updated 7 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆21Updated 8 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Import Nmap scans to Cherrytree☆36Updated 3 years ago
- A PowerShell script for performing a build review of a Windows host☆23Updated 6 years ago
- Bash script to parse multiple Nmap (.gnmap) exports into various plain-text formats for easy analysis.☆63Updated 12 years ago
- Send mail with handlebars like templates☆25Updated 6 years ago
- ☆140Updated 6 years ago
- One line PS scripts that may come handy during your network assesment☆78Updated 5 years ago
- Passive internal reconnaissance tool☆72Updated 3 years ago
- Merges multiple .nessus files into one file.☆46Updated 2 years ago