commonexploits / sonijohn
Sonicwall Firewall decoder, username, password hash extract. Formats into John the Ripper
☆22Updated 10 years ago
Related projects: ⓘ
- Find a useable IP address to use☆28Updated 10 years ago
- Weape-Wireless-EAP-Extractor☆26Updated 11 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 8 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆12Updated 8 years ago
- Specify targets and run sets of tools against them☆10Updated 9 years ago
- IRC bot for cracking hashes☆18Updated 3 years ago
- ☆10Updated this week
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 3 years ago
- Easy Window domain access☆50Updated 10 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆25Updated 4 years ago
- IP Address Listing Tool☆11Updated 11 years ago
- ☆34Updated this week
- ☆21Updated this week
- ☆47Updated 8 years ago
- Converts a command to a base64 powershell compatible string☆24Updated 10 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 7 years ago
- µphisher spear phishing tool (reference implementation)☆38Updated 4 years ago
- Basic Auth Phish page☆25Updated 7 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 6 years ago
- Custom stagers with python encrypting proxy☆40Updated 9 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Updated 7 years ago
- Web shells for use in penetration testing☆38Updated 9 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- my little bucket to store the delusions of grandeur I write in python :D☆31Updated 9 years ago
- Self contained htaccess shells and attacks☆14Updated 6 years ago
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆16Updated 8 years ago
- recon-ng Maltego local transform pack☆37Updated 10 years ago
- Some of my Nmap scripts☆21Updated 7 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 9 years ago