cheeseandcereal / fake-rdpLinks
Emulate the handshake packets of an RDP server with python
☆15Updated 7 years ago
Alternatives and similar repositories for fake-rdp
Users that are interested in fake-rdp are comparing it to the libraries listed below
Sorting:
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated last year
- A tool to parse, deduplicate, and query multiple port scans.☆58Updated 2 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Updated 6 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆25Updated 3 years ago
- ☆13Updated 4 years ago
- Extract credentials from lsass remotely☆16Updated 6 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- post exploitation user monitoring tool☆20Updated 7 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Updated 4 months ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Updated 5 years ago
- DNS logging, detection, ...☆15Updated 3 years ago
- Kibana app for RedELK☆18Updated 2 years ago
- Log converter from CS log to Ghostwriter CSV☆31Updated 5 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 5 years ago
- Sp00fer blog post -☆24Updated 3 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Updated 3 years ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- ☆24Updated 5 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated last month
- Log4j-Scanner with Bind-Receipt and custom hostnames☆18Updated 4 years ago
- ☆27Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆21Updated 4 years ago