Tangalanga: the Zoom conference scanner hacking tool
☆288Oct 20, 2020Updated 5 years ago
Alternatives and similar repositories for tangalanga
Users that are interested in tangalanga are comparing it to the libraries listed below
Sorting:
- A network scanner tool, developed in Python 3 using scapy.☆137Mar 1, 2026Updated 2 weeks ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Oct 30, 2018Updated 7 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- High Performance, lightweight, portable Open Source tool for mass SMBGhost Scan☆153Jun 25, 2020Updated 5 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆214Nov 26, 2020Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- Bramble is a hacking Open source suite.☆84Jan 21, 2020Updated 6 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆507Sep 23, 2025Updated 5 months ago
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆137Jun 6, 2019Updated 6 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- ☆128May 22, 2023Updated 2 years ago
- The Shadow Attack Framework☆1,115Sep 4, 2022Updated 3 years ago
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆27May 23, 2023Updated 2 years ago
- A wordlist for brute forcing directories / files☆10Jul 7, 2015Updated 10 years ago
- An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)☆65Jan 19, 2022Updated 4 years ago
- A high performance FortiGate SSL-VPN vulnerability scanning and exploitation tool.☆162Jun 30, 2023Updated 2 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Jan 7, 2021Updated 5 years ago
- XSHOCK Shellshock Exploit☆89Dec 8, 2022Updated 3 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- A simple script to generate a hidden url for social engineering.☆122Aug 11, 2020Updated 5 years ago
- vusialization of geo points from photos from vk profile☆48Feb 16, 2022Updated 4 years ago
- VPN seed4me Account Generator 1 Years☆11Jan 1, 2026Updated 2 months ago
- A toolkit to attack Office365☆1,116Nov 6, 2020Updated 5 years ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆100Dec 8, 2022Updated 3 years ago
- Web Application Vulnerability Scanner☆133Sep 25, 2020Updated 5 years ago
- Create visualization from Shodan query☆74May 25, 2021Updated 4 years ago
- Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline☆38Jun 30, 2018Updated 7 years ago
- Red Team PowerShell Script☆337Jul 31, 2023Updated 2 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆292May 2, 2024Updated last year
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 3 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- ABUSING WINDOWS TELEMETRY FOR PERSISTENCE☆140Jul 2, 2020Updated 5 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,169Sep 29, 2021Updated 4 years ago
- (Unofficial) Python API for http://namechk.com☆20Oct 15, 2015Updated 10 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 5 years ago