blacklanternsecurity / proxycannon-ngLinks
A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWHF 2018 security conference
☆17Updated 4 years ago
Alternatives and similar repositories for proxycannon-ng
Users that are interested in proxycannon-ng are comparing it to the libraries listed below
Sorting:
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Updated 2 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆40Updated 3 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Updated last year
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- ☆70Updated 2 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Files to automatically deploy red team Active Directory test lab☆47Updated 3 years ago
- Import Nmap scans to Cherrytree☆37Updated 3 years ago
- ☆49Updated 2 months ago
- General scripts that gather information out of Active Directory☆16Updated 3 years ago
- My Python Cookiecutter project template☆32Updated 3 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Updated 2 years ago
- ☆60Updated 2 years ago
- ☆16Updated 8 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆21Updated 4 months ago
- ☆61Updated 2 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Updated 7 months ago
- ☆15Updated 3 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆76Updated 7 months ago
- Ransomware Simulator for testing Blue Team Detections