int0x80 / githump
Loot email addresses from commit entries
☆56Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for githump
- ☆55Updated 4 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆78Updated 5 months ago
- Reporting Tips for Penetration Testers☆31Updated 3 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated this week
- Linux Local Privesc Helper and Agent☆165Updated 4 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆36Updated 6 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- Bash script to parse multiple Nmap (.gnmap) exports into various plain-text formats for easy analysis.☆58Updated 11 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 8 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆67Updated 6 years ago
- ☆98Updated 5 years ago
- Common Findings Database☆100Updated 5 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 7 years ago
- Automated enumeration☆30Updated 3 years ago
- Responsive Command and Control System☆101Updated 2 years ago
- Pypykatz server☆124Updated 5 years ago
- This is a simple parser for/decrypter for Impacket's esentutl.py utility. It assists with decrypting hashes and hash histories from ntds.…☆71Updated 7 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆164Updated 6 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆67Updated 7 years ago
- A ton of helpful tools☆39Updated 3 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- ☆61Updated 6 years ago
- Attack Knowledge Base☆100Updated 7 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆124Updated 6 years ago
- Pull author and committer names and emails from Travis-CI☆11Updated 4 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆64Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- tools for analyzing strings from password lists☆56Updated 2 years ago