enkomio / Mandolin0Links
A tool to brute force forms based authentication mechanism
☆11Updated 6 years ago
Alternatives and similar repositories for Mandolin0
Users that are interested in Mandolin0 are comparing it to the libraries listed below
Sorting:
- Volatility plugin to help identify DoublePulsar implant by listing the array of pointers SrvTransaction2DispatchTable from the srv.sys dr…☆16Updated 8 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 8 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local hos…☆159Updated 5 years ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- SMTP server / sinkhole for collecting spam☆45Updated 7 years ago
- A portable console aimed at making pentesting with PowerShell a little easier.☆48Updated 8 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆26Updated 8 years ago
- Yara intergrated into BurpSuite☆48Updated 9 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
- ☆25Updated 9 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Updated 6 years ago
- ☆61Updated 7 years ago
- Lutech TMS EHAT-NG☆14Updated 8 years ago
- Credential Phish Analysis and Automation☆98Updated 7 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 7 years ago
- SMB Auto authentication Vulnerability☆34Updated 9 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆105Updated 3 years ago
- Python script to hunt phishing kits☆137Updated 2 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- Linux Local Privesc Helper and Agent☆166Updated 6 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆128Updated 7 years ago
- ☆52Updated 7 years ago
- OpenCV based IDN option generator PoC☆39Updated 8 years ago
- GreyNoise Query Language☆82Updated 6 years ago
- An extensible honeypot framework☆96Updated 3 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 7 years ago
- ☆102Updated 6 years ago