evilsocket / legba-cookbookLinks
Legba recipes.
☆50Updated 10 months ago
Alternatives and similar repositories for legba-cookbook
Users that are interested in legba-cookbook are comparing it to the libraries listed below
Sorting:
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 8 months ago
- ☆28Updated last year
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last week
- Script to perform some hashcracking logic automagically☆71Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- Top hashpwn rules☆19Updated 7 months ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Updated 4 years ago
- Rubber Ducky powered by NeoKey☆25Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Tools used for Pentesting☆22Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 2 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆21Updated 2 years ago
- Gadget IoC removal from HAK5's BashBunny☆19Updated last year
- Convert Nmap output for integration with other Project Discovery tools☆15Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- self-hosted Azure OSINT tool☆30Updated 9 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆27Updated 8 months ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 10 months ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆42Updated 5 months ago
- A little cheatsheet for NetExec☆22Updated last year
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago