Tangalanga: the Zoom conference scanner hacking tool
☆288Oct 20, 2020Updated 5 years ago
Alternatives and similar repositories for tangalanga
Users that are interested in tangalanga are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A network scanner tool, developed in Python 3 using scapy.☆138Mar 1, 2026Updated 2 months ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Oct 30, 2018Updated 7 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- High Performance, lightweight, portable Open Source tool for mass SMBGhost Scan☆153Jun 25, 2020Updated 5 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆212Nov 26, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- Bramble is a hacking Open source suite.☆84Jan 21, 2020Updated 6 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆508Sep 23, 2025Updated 7 months ago
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆138Jun 6, 2019Updated 6 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- leaking net-ntlm with webdav☆25Feb 23, 2021Updated 5 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- ☆128May 22, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆28May 23, 2023Updated 2 years ago
- The Shadow Attack Framework☆1,117Sep 4, 2022Updated 3 years ago
- 🔍 Improve your files enumeration with specific extensions!☆18Jan 11, 2022Updated 4 years ago
- An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)☆66Jan 19, 2022Updated 4 years ago
- A high performance FortiGate SSL-VPN vulnerability scanning and exploitation tool.☆162Jun 30, 2023Updated 2 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆76Jan 7, 2021Updated 5 years ago
- XSHOCK Shellshock Exploit☆87Dec 8, 2022Updated 3 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- A simple script to generate a hidden url for social engineering.☆123Aug 11, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- VPN seed4me Account Generator 1 Years☆11Jan 1, 2026Updated 4 months ago
- vusialization of geo points from photos from vk profile☆47Feb 16, 2022Updated 4 years ago
- A toolkit to attack Office365☆1,122Nov 6, 2020Updated 5 years ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆99Dec 8, 2022Updated 3 years ago
- Web Application Vulnerability Scanner☆137Sep 25, 2020Updated 5 years ago
- Create visualization from Shodan query☆74May 25, 2021Updated 4 years ago
- Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline☆38Jun 30, 2018Updated 7 years ago
- Red Team PowerShell Script☆338Jul 31, 2023Updated 2 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆297May 2, 2024Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆250Jun 19, 2024Updated last year
- ABUSING WINDOWS TELEMETRY FOR PERSISTENCE☆140Jul 2, 2020Updated 5 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,172Sep 29, 2021Updated 4 years ago
- (Unofficial) Python API for http://namechk.com☆20Oct 15, 2015Updated 10 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 6 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆534Mar 27, 2022Updated 4 years ago