chopicalqui / SmartFileHunterLinks
The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or private keys. Thereby, SFH is able to enumerate FTP, NFS, or SMB services as well as local filesystems.
☆14Updated 2 years ago
Alternatives and similar repositories for SmartFileHunter
Users that are interested in SmartFileHunter are comparing it to the libraries listed below
Sorting:
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- ☆28Updated last year
- FireProx written in Go☆19Updated last year
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Tactics, Techniques, and Procedures☆25Updated 4 months ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Bash script to generate reverse shell payloads☆19Updated last year
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- masscan with exclusive excludes☆56Updated last year
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 5 months ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 10 months ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆36Updated last year
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated last month
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 6 months ago
- Simple utility to manage multiple ssh☆15Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆15Updated last year
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated last month
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 3 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- Validate proxies for specific domain☆36Updated 3 years ago
- ☆29Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago