hackerschoice / thc-rut
THC "R U There" network discovery tool
☆26Updated 4 years ago
Alternatives and similar repositories for thc-rut:
Users that are interested in thc-rut are comparing it to the libraries listed below
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆41Updated 2 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- A rogue DNS detector☆23Updated last year
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- wordlists for password cracking☆26Updated 2 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 4 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Zone transfers for rwhois☆20Updated 5 years ago
- Daily TLD health report generated using RIPE's DNSCheck against all existing TLDs.☆18Updated 8 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated 4 months ago
- Exfiltration based on custom X509 certificates☆26Updated 11 months ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆18Updated 8 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- Secure File Transfer via Global Socket Bounce Network☆24Updated 3 years ago
- DNS logging, detection, ...☆15Updated 2 years ago
- Data exfiltration using reflective DNS resolution covert channel☆51Updated 7 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- ☆22Updated 4 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- Simple S3 Bucket Testing Software☆31Updated 3 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago