cryptolok / EPMGLinks
Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords
☆22Updated 4 years ago
Alternatives and similar repositories for EPMG
Users that are interested in EPMG are comparing it to the libraries listed below
Sorting:
- Simple reverse ICMP shell☆41Updated 12 years ago
- ☆27Updated 7 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31Updated 9 years ago
- ☆17Updated 10 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- A centralized location for all presentations I've given at various conferences☆26Updated 7 years ago
- ANWI - All New Wireless IDS☆27Updated 6 years ago
- Starts an ngrok TCP tunnel and notifies you of the URL. Perfect for automated remote SSH connections.☆14Updated 4 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 8 years ago
- ☆42Updated 11 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 8 years ago
- Clone of Metasploit's wiki w/ additions☆15Updated 9 years ago
- A collection of scripts made duing my personal research☆29Updated 6 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆79Updated 7 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- Social Engineering Abusing Google App Scripts☆24Updated 8 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Pastenum is a text dump enumeration tool.☆14Updated 11 years ago
- Suite for Information gathering☆12Updated 6 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago