internetofallthethings / cr3-nmapLinks
NMAP NSE script for detecting devices that speak the Crimson v3 protocol
☆12Updated 10 years ago
Alternatives and similar repositories for cr3-nmap
Users that are interested in cr3-nmap are comparing it to the libraries listed below
Sorting:
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 10 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- Enumerate RIDs using pure Python☆31Updated 11 months ago
- Windows Privesc Check☆20Updated 11 years ago
- Data exfiltration PoC scripts☆25Updated 9 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 4 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- Mimikatz HashClash☆12Updated 10 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Updated 10 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Updated 10 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Automated script to search in SMB protocol for availables pipe names☆23Updated 7 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 4 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- AV Bypass☆29Updated 7 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Updated 8 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆31Updated 8 years ago
- ☆17Updated 7 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- ☆1Updated 6 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆53Updated last year
- Nashorn Post Exploitation☆32Updated 7 years ago