evilsocket / legba-cookbookLinks
Legba recipes.
☆51Updated last year
Alternatives and similar repositories for legba-cookbook
Users that are interested in legba-cookbook are comparing it to the libraries listed below
Sorting:
- Tool for analyzing SAP Secure Network Communications (SNC).☆53Updated last year
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- ☆27Updated 2 years ago
- 🎥 Spytruder: Advanced RTSP Camera Discovery and Vulnerability Assessment Tool☆20Updated 4 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Script to perform some hashcracking logic automagically☆77Updated 2 months ago
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆21Updated last year
- CLI & library to search for default credentials among thousands of Products / Vendors☆54Updated 9 months ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆44Updated last year
- Convert Nmap output for integration with other Project Discovery tools☆15Updated 2 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆25Updated last week
- Top hashpwn rules☆21Updated 11 months ago
- Extract credentials and other useful info from network captures☆72Updated 3 years ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆43Updated 10 months ago
- hiding in plain sight: part 2☆45Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Updated 4 years ago
- wsnet☆27Updated last month
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆124Updated last year
- A user enumeration tool for Slack.☆31Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 9 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Collection of extra pentest tools for Kali Linux☆110Updated last month
- ☆79Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago