Quickly check credentials against multiple websites and identify instances of credential reuse
☆106Nov 15, 2016Updated 9 years ago
Alternatives and similar repositories for ModLogin
Users that are interested in ModLogin are comparing it to the libraries listed below
Sorting:
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13May 21, 2018Updated 7 years ago
- Python bindings for Yeti's API☆19Sep 12, 2023Updated 2 years ago
- Transforms for the AlienVault OTX service☆39Nov 3, 2016Updated 9 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- Carve Windows Prefetch files from arbitrary binary data☆16Jun 11, 2017Updated 8 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Sep 24, 2014Updated 11 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Jul 10, 2018Updated 7 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆71Jul 26, 2018Updated 7 years ago
- splunk_pentest_app☆50Apr 22, 2016Updated 9 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆16Sep 15, 2013Updated 12 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆183Jun 10, 2022Updated 3 years ago
- The Credential Mapper☆451Dec 1, 2017Updated 8 years ago
- Starts an ngrok TCP tunnel and notifies you of the URL. Perfect for automated remote SSH connections.☆14Jan 24, 2021Updated 5 years ago
- JXA script to allow programmatic persistence via macOS Calendar.app alerts.☆44Oct 31, 2020Updated 5 years ago
- NG-NetMS is a new end-to-end network management platform for your Linux servers, Cisco, Juniper, HP and Extreme routers, switches and fir…☆40Dec 5, 2017Updated 8 years ago
- Maltego Transform to put entities into MISP events☆28Jul 24, 2021Updated 4 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆46Nov 22, 2017Updated 8 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- A shell script for running lightning talks with a cow as a compere.☆15Jun 5, 2020Updated 5 years ago
- Powershell Persistence Locator☆67Sep 11, 2016Updated 9 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆38Mar 14, 2017Updated 9 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Feb 12, 2020Updated 6 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- A git submodule list containing all the tools repo's you'll ever need.☆27May 22, 2019Updated 6 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Jun 5, 2017Updated 8 years ago
- Scumblr instructions with custom search providers for monitoring malicous content☆17Nov 18, 2017Updated 8 years ago
- ☆94Nov 1, 2018Updated 7 years ago
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆278Feb 12, 2021Updated 5 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆48Jan 1, 2017Updated 9 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆12Mar 14, 2018Updated 8 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago