casterbyte / Nihilist
Cisco IOS Security Inspector
☆17Updated last week
Alternatives and similar repositories for Nihilist:
Users that are interested in Nihilist are comparing it to the libraries listed below
- 1C RAS Offensive Security Tool☆25Updated last year
- ☆17Updated last week
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆18Updated 11 months ago
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆12Updated 6 months ago
- GitHub CVE Repository Hunt☆18Updated 8 months ago
- An asynchronous TCP and UDP port scanner developed by the late Jack C. Louis.☆34Updated 10 years ago
- RSEScan is a command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a gi…☆16Updated 9 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆24Updated 8 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 5 months ago
- Useful collection of scapy-scripts and more☆27Updated 9 months ago
- Fast Path Traversal exploitation tool☆21Updated 11 months ago
- All in 1 phishing framework☆35Updated 2 years ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆40Updated 2 months ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆12Updated 3 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- ☆58Updated last year
- 🚀 CSRFShark - a utility for manipulating cross-site request forgery attacks☆32Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- karma WiFi attack implementation☆48Updated 5 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆35Updated 9 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated last year
- exfiltration/infiltration toolkit☆44Updated 4 months ago
- Top 400 passwords as per HaveIBeenPwned☆22Updated 5 months ago
- Auto exploitation tool for CVE-2024-24401.☆33Updated 6 months ago
- ☆27Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆48Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 2 years ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 7 months ago