apuentemedallia / tools-and-techniques-for-vulnerability-validation
☆21Updated 7 years ago
Alternatives and similar repositories for tools-and-techniques-for-vulnerability-validation:
Users that are interested in tools-and-techniques-for-vulnerability-validation are comparing it to the libraries listed below
- Password spraying script and helper for creating password lists☆34Updated 4 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Updated 5 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 6 years ago
- A PowerShell script for performing a build review of a Windows host☆23Updated 6 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆42Updated 4 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Updated 6 years ago
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆33Updated 3 years ago
- Send mail with handlebars like templates☆25Updated 5 years ago
- A tool to abuse Exchange services☆18Updated 5 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- Bash script to parse multiple Nmap (.gnmap) exports into various plain-text formats for easy analysis.☆60Updated 12 years ago
- Reconnaissance tool for Microsoft Office 365☆67Updated 6 years ago
- Comprehensive parsing script for grepable Nmap output files. Provides a summary table, split hosts files, and URLs for web and SMB hosts.☆20Updated 4 years ago
- Collection of rules and debug data for hashcat☆18Updated 7 years ago
- Enumerate RIDs using pure Python☆31Updated 7 months ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 10 years ago
- Automating those tasks which can or should be automated☆61Updated 7 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆75Updated 10 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆49Updated 7 years ago
- ☆79Updated 8 years ago
- Reporting Tips for Penetration Testers☆31Updated 3 years ago
- A parser to extract information from .nessus file format☆23Updated 4 years ago
- ☆17Updated 7 years ago
- A Tool for Domain Flyovers☆18Updated 5 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆29Updated 6 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago