benpturner / h00kView external linksLinks
h00k
☆13Jul 28, 2016Updated 9 years ago
Alternatives and similar repositories for h00k
Users that are interested in h00k are comparing it to the libraries listed below
Sorting:
- A web interface for Hashcat/oclHashcat☆30Nov 15, 2016Updated 9 years ago
- (Unofficial) Python API for http://namechk.com☆20Oct 15, 2015Updated 10 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- A fuzzing script for MitmProxy☆24May 15, 2015Updated 10 years ago
- ☆27Jul 18, 2017Updated 8 years ago
- Packers for Desktop agents☆73Jul 6, 2015Updated 10 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago
- An SDR-based transeciver for amateur radio contests☆35May 1, 2025Updated 9 months ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- GRAnd: Extra blocks, IO, and tools for GNU Radio on Android☆10Aug 27, 2015Updated 10 years ago
- A powershell script for creating a Windows honeyport.☆90Mar 26, 2025Updated 10 months ago
- ☆35Jul 13, 2016Updated 9 years ago
- A TCP proxy over named pipes. Originally created for maintaining a meterpreter session over 445 for less network alarms.☆242Sep 13, 2021Updated 4 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Oct 13, 2022Updated 3 years ago
- ☆11May 24, 2017Updated 8 years ago
- ☆12May 6, 2021Updated 4 years ago
- Ultimate List Of Bug Bounty Tools☆10Feb 25, 2023Updated 2 years ago
- A bookmarklet that shows the ordering on the directed edges of your facebook friends☆30Mar 28, 2013Updated 12 years ago
- iOS forensics utility☆12May 8, 2018Updated 7 years ago
- CTFs On Demand☆13Mar 23, 2025Updated 10 months ago
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 7 years ago
- NBFM for transforming a Raspberry PI into a ham radio FM transmitter☆13Feb 12, 2015Updated 11 years ago
- top usernames from azure survey 2025☆14Apr 25, 2025Updated 9 months ago
- Use rtl-sdr to receive EnergyCount 3000 transmissions☆19Oct 10, 2016Updated 9 years ago
- SMBMap is a handy SMB enumeration tool☆38Jun 18, 2024Updated last year
- 3 tools that work together to simplify reconaissance of Windows File Shares☆170Mar 7, 2018Updated 7 years ago
- Recursively searches a directory for any file containing a specified string☆48Jul 5, 2015Updated 10 years ago
- pwning & info gathering via user browser☆39May 7, 2015Updated 10 years ago
- POSHSPY backdoor code☆46Apr 4, 2017Updated 8 years ago
- VirtualBox Virtual Machines used for IPv6 training☆11Jun 6, 2016Updated 9 years ago
- Recovering data from the iPhone Ipod Touch corrupted backups☆13Oct 29, 2016Updated 9 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- Jenkins Plugin from Contrast Security☆13Aug 9, 2024Updated last year
- ☆10Mar 29, 2022Updated 3 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- Ansible playbooks to facilitate redteam stuff☆14Aug 2, 2016Updated 9 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 10 years ago
- A command-line tool for interfacing msr devices.☆12Nov 25, 2020Updated 5 years ago