blacklanternsecurity / proxycannon-ngLinks
A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWHF 2018 security conference
☆17Updated 4 years ago
Alternatives and similar repositories for proxycannon-ng
Users that are interested in proxycannon-ng are comparing it to the libraries listed below
Sorting:
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 11 months ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- A Burp Pro extension that adds log4shell checks to Burp Scanner.☆27Updated 3 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- ☆20Updated 5 years ago
- My Python Cookiecutter project template☆31Updated 2 years ago
- sudo-parser is a tool to audit complex sudoers files☆17Updated 2 years ago
- General scripts that gather information out of Active Directory☆16Updated 3 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- Automatically perform advanced NTLM hash relay attacks☆15Updated 2 years ago
- Helpful operator notes and techniques in actionable form☆17Updated last year
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15Updated 4 years ago
- wordlists for password cracking☆28Updated 2 years ago
- A simple bastion host setup designed for cloud-hosted lab environments.☆28Updated 4 years ago
- NetSPI HTTP Scrapers☆28Updated 6 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated 3 months ago
- ☆33Updated 5 months ago
- ☆16Updated 8 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 7 months ago
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- Files to automatically deploy red team Active Directory test lab☆45Updated 3 years ago
- ☆70Updated last year
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 4 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago