gryhathack / PowerSploit_Sensitive_Info_HunterLinks
Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)
☆14Updated 7 years ago
Alternatives and similar repositories for PowerSploit_Sensitive_Info_Hunter
Users that are interested in PowerSploit_Sensitive_Info_Hunter are comparing it to the libraries listed below
Sorting:
- Tooling and commands for common red team and Infrastructure testing tasks☆43Updated 3 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Password spraying script and helper for creating password lists☆34Updated 5 years ago
- PHP tool to test XSS☆22Updated 6 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- AWS S3 Bucket/Object Finder☆25Updated 8 years ago
- A Pythonic wrapper to MassDNS☆24Updated 7 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- API testing tool written with Python☆56Updated 8 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Updated 7 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- ☆21Updated 6 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 7 years ago
- Alphanumeric Encoder☆25Updated 7 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆32Updated 6 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 6 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆45Updated 4 years ago
- Subdomain Enumeration and Scanner☆34Updated 5 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆80Updated 4 years ago
- Screenshot Shenanigans☆26Updated 8 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- automatic scan for hackthebox☆13Updated 5 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- Comprehensive parsing script for grepable Nmap output files. Provides a summary table, split hosts files, and URLs for web and SMB hosts.☆20Updated 5 years ago
- AV Bypass☆29Updated 7 years ago
- Yet another open S3 bucket finder☆20Updated 7 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 6 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 6 years ago
- Clickjacking PoC Generator☆35Updated 5 years ago