firefart / cisco-snmp-pwner
Tool to dump cisco device configs via snmp and/or add new users
☆10Updated last week
Alternatives and similar repositories for cisco-snmp-pwner:
Users that are interested in cisco-snmp-pwner are comparing it to the libraries listed below
- Powershell modules and commands that come in handy for pentests and red team assessments.☆16Updated 6 years ago
- Acherus, The Docker Hold, is a containerized hacking environment gathering many tools and resources☆14Updated last month
- ☆12Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- Miscellaneous tools for BloodHound☆18Updated 2 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Updated 3 years ago
- Free Advance encryptor for Anon Cloud☆17Updated last year
- Automated network asset, email, and social media profile discovery and cataloguing.☆11Updated 3 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 5 months ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated 8 months ago
- VLAN attacks toolkit☆13Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆16Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆35Updated 2 years ago
- A platform Where A User can Find the Online Presence of Social Media Handle on the Internet.☆12Updated 3 years ago
- A tool designed to analyse email headers☆33Updated 2 years ago
- Red Teaming Tactics and Techniques☆14Updated 2 years ago
- WebHook for Red Team☆24Updated 3 years ago
- Table of common WiFi router SSIDs with their corresponding router model, WPA key examples, keyspace, format and default web interface cre…☆10Updated 2 years ago
- Nexus of Android banking Trojans☆15Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- ☆16Updated 2 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Updated 2 years ago
- Burp suite Certificate modification tool☆18Updated last year
- An OSINT tool to search for accounts by username in social networks.☆16Updated 2 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆19Updated 2 years ago