Tangalanga: the Zoom conference scanner hacking tool
☆288Oct 20, 2020Updated 5 years ago
Alternatives and similar repositories for tangalanga
Users that are interested in tangalanga are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A network scanner tool, developed in Python 3 using scapy.☆137Mar 1, 2026Updated 2 months ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Oct 30, 2018Updated 7 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- High Performance, lightweight, portable Open Source tool for mass SMBGhost Scan☆153Jun 25, 2020Updated 5 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆213Nov 26, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- Bramble is a hacking Open source suite.☆84Jan 21, 2020Updated 6 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆508Sep 23, 2025Updated 7 months ago
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆138Jun 6, 2019Updated 6 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- ☆128May 22, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆27May 23, 2023Updated 2 years ago
- The Shadow Attack Framework☆1,117Sep 4, 2022Updated 3 years ago
- An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)☆65Jan 19, 2022Updated 4 years ago
- A high performance FortiGate SSL-VPN vulnerability scanning and exploitation tool.☆162Jun 30, 2023Updated 2 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Jan 7, 2021Updated 5 years ago
- XSHOCK Shellshock Exploit☆87Dec 8, 2022Updated 3 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- A simple script to generate a hidden url for social engineering.☆123Aug 11, 2020Updated 5 years ago
- VPN seed4me Account Generator 1 Years☆11Jan 1, 2026Updated 4 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- vusialization of geo points from photos from vk profile☆47Feb 16, 2022Updated 4 years ago
- A toolkit to attack Office365☆1,120Nov 6, 2020Updated 5 years ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆99Dec 8, 2022Updated 3 years ago
- Web Application Vulnerability Scanner☆135Sep 25, 2020Updated 5 years ago
- Create visualization from Shodan query☆74May 25, 2021Updated 4 years ago
- Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline☆38Jun 30, 2018Updated 7 years ago
- Red Team PowerShell Script☆338Jul 31, 2023Updated 2 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆294May 2, 2024Updated last year
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆250Jun 19, 2024Updated last year
- ABUSING WINDOWS TELEMETRY FOR PERSISTENCE☆140Jul 2, 2020Updated 5 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,173Sep 29, 2021Updated 4 years ago
- (Unofficial) Python API for http://namechk.com☆20Oct 15, 2015Updated 10 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 6 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆534Mar 27, 2022Updated 4 years ago
- hacking tools☆14Jan 29, 2023Updated 3 years ago