evilsocket / legba-cookbookLinks
Legba recipes.
☆50Updated last year
Alternatives and similar repositories for legba-cookbook
Users that are interested in legba-cookbook are comparing it to the libraries listed below
Sorting:
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- ☆28Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 11 months ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆23Updated 9 months ago
- Passworld is a fully customizable wordlist generator☆16Updated last year
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆28Updated last year
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆43Updated 8 months ago
- Script to perform some hashcracking logic automagically☆75Updated 2 weeks ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- masscan with exclusive excludes☆58Updated last year
- A Red Teaming tool focused on profiling the target.☆27Updated 2 months ago
- Tools used for Pentesting☆22Updated 2 years ago
- 🎥 Spytruder: Advanced RTSP Camera Discovery and Vulnerability Assessment Tool☆18Updated 2 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆53Updated 2 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last week
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆36Updated 2 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆53Updated 7 months ago
- A script to automate keystrokes through a graphical desktop program.☆35Updated 3 months ago
- A user enumeration tool for Slack.☆31Updated last year
- A swiss army knife for pentesting networks☆26Updated 3 years ago
- Fast website scraper and wordlist generator☆81Updated 4 months ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 2 years ago