commonexploits / vlan-hoppingView external linksLinks
Easy 802.1Q VLAN Hopping
☆80Jul 23, 2024Updated last year
Alternatives and similar repositories for vlan-hopping
Users that are interested in vlan-hopping are comparing it to the libraries listed below
Sorting:
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆77Jul 7, 2014Updated 11 years ago
- Quick scan to find live hosts on the network/across networks☆48Jul 4, 2014Updated 11 years ago
- Easy 802.1Q VLAN Hopping☆390Feb 24, 2016Updated 9 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆199Nov 19, 2017Updated 8 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆147May 10, 2016Updated 9 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆19Aug 19, 2016Updated 9 years ago
- ☆252Sep 18, 2019Updated 6 years ago
- Public repository for improvements to the EXTRABACON exploit☆163Nov 2, 2016Updated 9 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 8 years ago
- Scripts for Deploying new server☆49Apr 26, 2025Updated 9 months ago
- Sonicwall Firewall decoder, username, password hash extract. Formats into John the Ripper☆25Jul 4, 2014Updated 11 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Oct 14, 2017Updated 8 years ago
- Windows Offline Common Password Hash Checker☆29Aug 9, 2016Updated 9 years ago
- Fileless web browser information extraction☆220Apr 23, 2018Updated 7 years ago
- A PowerShell script for performing a build review of a Windows host☆23Mar 11, 2019Updated 6 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆634Jun 20, 2017Updated 8 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- Easy Window domain access☆51Apr 3, 2014Updated 11 years ago
- A ton of helpful tools☆344Oct 8, 2021Updated 4 years ago
- ☆612Oct 4, 2024Updated last year
- 浏览器XSS 过滤器Fuzzing 框架 (browser xss aduit fuzzing framework )..☆15Sep 13, 2016Updated 9 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- docker env for ios research on a mac host☆27Jun 12, 2025Updated 8 months ago
- Malicious Macro Generator☆831Apr 17, 2019Updated 6 years ago
- Exploit the credentials present in files and memory☆845May 25, 2023Updated 2 years ago
- Local UNIX PrivEsc Aggregation☆244Apr 9, 2016Updated 9 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆353Aug 27, 2018Updated 7 years ago
- Carve Windows Prefetch files from arbitrary binary data☆16Jun 11, 2017Updated 8 years ago
- Tools for auditing WAFS☆19Feb 25, 2022Updated 3 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,865Jun 28, 2024Updated last year
- Powershell SAP assessment tool☆200Aug 13, 2018Updated 7 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,013Jul 3, 2018Updated 7 years ago
- Search for categorized domain☆453Jan 15, 2019Updated 7 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆226Dec 29, 2015Updated 10 years ago