gocaio / gocaView external linksLinks
Goca Scanner
☆328Oct 11, 2023Updated 2 years ago
Alternatives and similar repositories for goca
Users that are interested in goca are comparing it to the libraries listed below
Sorting:
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆137Jun 6, 2019Updated 6 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Dec 4, 2020Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- Declarative penetration testing orchestration framework☆295Dec 20, 2019Updated 6 years ago
- ☆25May 9, 2021Updated 4 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Jun 26, 2021Updated 4 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆504Sep 23, 2025Updated 4 months ago
- Interactive Network Scanner☆1,039Oct 21, 2020Updated 5 years ago
- Discover target social media profiles☆81Sep 26, 2022Updated 3 years ago
- Burp Commander written in Go☆57Feb 11, 2019Updated 7 years ago
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- ☆128May 22, 2023Updated 2 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- A framework for stealthy domain reconnaissance☆302Oct 14, 2021Updated 4 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- locate and attack Lync/Skype for Business☆346Oct 1, 2024Updated last year
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆538Mar 27, 2022Updated 3 years ago
- ☆92Dec 8, 2022Updated 3 years ago
- A toolkit to attack Office365☆1,114Nov 6, 2020Updated 5 years ago
- CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search eng…☆376Feb 4, 2024Updated 2 years ago
- Network Pivoting Toolkit☆456Aug 26, 2023Updated 2 years ago
- Samba, NFS shares spider and grepper☆71Jul 11, 2018Updated 7 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- An asynchronous enumeration & vulnerability scanner. Run all the tools on all the hosts.☆400Mar 24, 2021Updated 4 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Collect information about email addresses from Pastebin☆39Jun 1, 2021Updated 4 years ago
- Sustainable shellcode evasion☆112Dec 11, 2024Updated last year
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆380Aug 13, 2021Updated 4 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,318Dec 6, 2023Updated 2 years ago
- framework to rapidly implement custom droppers for all three major operating systems☆703Feb 24, 2024Updated last year
- Bloodhound Attack Path Automation in CobaltStrike☆325Apr 26, 2020Updated 5 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,551Oct 17, 2022Updated 3 years ago
- Security checks for http headers and cookies☆27Feb 11, 2021Updated 5 years ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,081Apr 5, 2022Updated 3 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆470Nov 14, 2019Updated 6 years ago
- Framework for exploiting local vulnerabilities☆84Nov 18, 2023Updated 2 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆317Mar 31, 2021Updated 4 years ago