hackerschoice / thc-rut
THC "R U There" network discovery tool
☆27Updated 4 years ago
Alternatives and similar repositories for thc-rut:
Users that are interested in thc-rut are comparing it to the libraries listed below
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆31Updated 3 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- ☆31Updated 3 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Secure File Transfer via Global Socket Bounce Network☆24Updated 3 years ago
- Miscellaneous analysis tools☆26Updated 10 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- A simple way to exfiltrate data using spotify API☆18Updated last week
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated 5 months ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 4 years ago
- Data exfiltration using reflective DNS resolution covert channel☆51Updated 7 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆41Updated 2 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- A Canary which fires when uninstalled☆34Updated 3 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- A rogue DNS detector☆23Updated last year
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago