claudijd / c7decrypt
Cisco Password Encryptor/Decryptor
☆26Updated last year
Alternatives and similar repositories for c7decrypt:
Users that are interested in c7decrypt are comparing it to the libraries listed below
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 11 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆22Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Passive Network Audit Framework☆32Updated 6 years ago
- Automated Security Assessment Reporting Tool☆37Updated 7 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 10 years ago
- Passive recon / OSINT automation script☆40Updated 6 years ago
- another nmap summarising script☆25Updated 4 years ago
- Plugins for the Serpico Project☆22Updated 6 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆28Updated 8 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- One-off scripts☆50Updated 7 years ago
- My pentest cheat sheet☆15Updated 7 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 3 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- Weape-Wireless-EAP-Extractor☆29Updated 11 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆36Updated 4 years ago
- Checkpoint Firewall Ruleset Auditor ( For the HTML exports when you do not have the object files )☆36Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- Custom scripts used during the scenario☆21Updated 3 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- ☆26Updated 4 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago