evilsocket / legba-cookbookLinks
Legba recipes.
☆51Updated last year
Alternatives and similar repositories for legba-cookbook
Users that are interested in legba-cookbook are comparing it to the libraries listed below
Sorting:
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- ☆27Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆45Updated 11 months ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 5 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆56Updated last year
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆28Updated 2 years ago
- Script to perform some hashcracking logic automagically☆80Updated last month
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆24Updated 7 months ago
- wsnet☆27Updated 3 months ago
- Convert Nmap output for integration with other Project Discovery tools☆15Updated 2 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆54Updated 10 months ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated last week
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆29Updated 2 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Updated 2 months ago
- masscan with exclusive excludes☆58Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆45Updated last year
- CVE-2013-4786 Go exploitation tool☆39Updated last month
- A swiss army knife for pentesting networks☆26Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆112Updated 3 months ago
- Ease and assist the compromise of an Active Directory environment.☆30Updated 4 years ago
- Multithreaded spraying of a password on all accounts of a domain.☆25Updated 10 months ago
- ☆30Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago