atktgs / BlackHat2015Arsenal
My Quick Note of BlackHat 2015 Arsenal
☆27Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for BlackHat2015Arsenal
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- Tools for use with phishing frenzy☆11Updated 5 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- post-exploitation tools☆15Updated 6 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 12 years ago
- ☆17Updated 10 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- uses keywords from alert logs to send SMS☆25Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- Collect hashes password hashes for cracking☆30Updated 11 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Artefacts from various retefe campaigns☆10Updated 5 years ago
- µphisher spear phishing tool (reference implementation)☆38Updated 4 years ago
- Automated install process for Phishing Frenzy☆23Updated 9 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 9 years ago
- BurpJDSer-ng☆26Updated this week
- ☆26Updated 7 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆36Updated 8 years ago
- hemingway is a simple and easy to use spear phishing helper.☆38Updated 7 years ago
- Websocket based egress tester☆20Updated 7 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆40Updated 4 years ago