This repository has been combined with mac-tracker project and no longer receives updates.
☆575Jun 22, 2025Updated 9 months ago
Alternatives and similar repositories for mac-ages
Users that are interested in mac-ages are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Historical Tracking of MAC Address Assignments☆42Updated this week
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆547May 1, 2025Updated 10 months ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 5 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,129Dec 7, 2022Updated 3 years ago
- UAC Bypass with mmc via alpc☆158Apr 5, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.☆696May 16, 2020Updated 5 years ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆822Jul 8, 2020Updated 5 years ago
- ☆98Feb 21, 2019Updated 7 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Like nmap for mapping wifi networks you're not connected to, plus device tracking☆2,717Mar 22, 2026Updated last week
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,093Feb 19, 2019Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- pypykats in your browser☆56Sep 28, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- nextnet is a pivot point discovery tool written in Go.☆453Aug 4, 2025Updated 7 months ago
- Robber is open source tool for finding executables prone to DLL hijacking☆786Jun 23, 2022Updated 3 years ago
- Recog-Go: Pattern Recognition using Rapid7 Recog☆119Jan 15, 2026Updated 2 months ago
- Binary matching with Binary Ninja☆22Jul 8, 2024Updated last year
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,812Mar 20, 2026Updated last week
- A fully functional DanderSpritz lab in 2 commands☆450May 16, 2019Updated 6 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆169Oct 1, 2017Updated 8 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A framework for wireless pentesting.☆1,231Oct 14, 2020Updated 5 years ago
- DARKSURGEON is a Windows packer project to empower incident response, digital forensics, malware analysis, and network defense.☆470Jul 21, 2020Updated 5 years ago
- shellz is a small utility to manage your ssh, telnet, kubernetes, winrm, web or any custom shell in a single place.☆614Jul 13, 2024Updated last year
- Bash post exploitation toolkit☆747Mar 8, 2026Updated 3 weeks ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Apr 22, 2018Updated 7 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆680Oct 28, 2023Updated 2 years ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,215Feb 6, 2022Updated 4 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Tool to scan for secret files on HTTP servers☆2,105Feb 4, 2026Updated last month
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆183Jun 10, 2022Updated 3 years ago
- Golang IPv6 address enumeration☆358May 27, 2019Updated 6 years ago
- Password spraying using AWS Lambda for IP rotation☆656Feb 14, 2023Updated 3 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆471Nov 14, 2019Updated 6 years ago
- THE ESP8266 HONEYPOT☆319Aug 12, 2020Updated 5 years ago