This repository has been combined with mac-tracker project and no longer receives updates.
☆576Jun 22, 2025Updated 10 months ago
Alternatives and similar repositories for mac-ages
Users that are interested in mac-ages are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Historical Tracking of MAC Address Assignments☆45Updated this week
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆549May 1, 2025Updated last year
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 5 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,128Dec 7, 2022Updated 3 years ago
- UAC Bypass with mmc via alpc☆160Apr 5, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.☆695May 16, 2020Updated 5 years ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆822Jul 8, 2020Updated 5 years ago
- ☆98Feb 21, 2019Updated 7 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Like nmap for mapping wifi networks you're not connected to, plus device tracking☆2,728Mar 22, 2026Updated last month
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,095Feb 19, 2019Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- pypykats in your browser☆56Sep 28, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- nextnet is a pivot point discovery tool written in Go.☆453Aug 4, 2025Updated 9 months ago
- Robber is open source tool for finding executables prone to DLL hijacking☆792Apr 29, 2026Updated last week
- Recog-Go: Pattern Recognition using Rapid7 Recog☆119Jan 15, 2026Updated 3 months ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- A fully functional DanderSpritz lab in 2 commands☆450May 16, 2019Updated 6 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,824Apr 26, 2026Updated 2 weeks ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆169Oct 1, 2017Updated 8 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- DARKSURGEON is a Windows packer project to empower incident response, digital forensics, malware analysis, and network defense.☆471Jul 21, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Bash post exploitation toolkit☆749Apr 1, 2026Updated last month
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- A framework for wireless pentesting.☆1,236Oct 14, 2020Updated 5 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Apr 22, 2018Updated 8 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆681Oct 28, 2023Updated 2 years ago
- shellz is a small utility to manage your ssh, telnet, kubernetes, winrm, web or any custom shell in a single place.☆615Jul 13, 2024Updated last year
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,227Feb 6, 2022Updated 4 years ago
- Tool to scan for secret files on HTTP servers☆2,103Feb 4, 2026Updated 3 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆184Jun 10, 2022Updated 3 years ago
- Golang IPv6 address enumeration☆357May 27, 2019Updated 6 years ago
- Password spraying using AWS Lambda for IP rotation☆663Feb 14, 2023Updated 3 years ago
- THE ESP8266 HONEYPOT☆319Aug 12, 2020Updated 5 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,615Dec 10, 2018Updated 7 years ago
- A framework for stealthy domain reconnaissance☆302Oct 14, 2021Updated 4 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago