isaudits / pasv-agrsv
Passive recon / OSINT automation script
☆40Updated 6 years ago
Alternatives and similar repositories for pasv-agrsv:
Users that are interested in pasv-agrsv are comparing it to the libraries listed below
- PHP Phishing Framework☆28Updated 11 years ago
- Threat Intel and Incident Reponse☆10Updated 6 years ago
- Script to automate, manage, and multithread Nikto scans.☆57Updated 4 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆45Updated 9 years ago
- ☆17Updated 10 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Weape-Wireless-EAP-Extractor☆27Updated 11 years ago
- hemingway is a simple and easy to use spear phishing helper.☆39Updated 8 years ago
- Platform for Browser Exploitation☆33Updated 9 years ago
- recon-ng Maltego local transform pack☆39Updated 11 years ago
- Pentesting Tools☆21Updated 2 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Easy Window domain access☆51Updated 10 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆23Updated 10 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- Plugins for the Serpico Project☆22Updated 6 years ago
- µphisher spear phishing tool (reference implementation)☆38Updated 4 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- Self contained htaccess shells and attacks☆14Updated 6 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- Tools for use with phishing frenzy☆11Updated 6 years ago
- VAPT is a Vulnerability Assessment and Penetration Testing toolkit -- a small collection of some of the common testing tools specifically…☆28Updated 3 months ago
- A collection of nmap scripts I've written☆23Updated 8 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Updated 10 years ago