joda32 / got-respondedView external linksLinks
A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)
☆36Mar 21, 2019Updated 6 years ago
Alternatives and similar repositories for got-responded
Users that are interested in got-responded are comparing it to the libraries listed below
Sorting:
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Automate Metasploit scanning and exploitation☆117Jul 20, 2025Updated 6 months ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- ☆25May 9, 2021Updated 4 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29May 22, 2023Updated 2 years ago
- Blind SQL Injection Tool with Golang☆79Dec 31, 2021Updated 4 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 3 months ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 6 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 3 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- a hash query tool☆36Feb 12, 2019Updated 7 years ago
- ☆128May 22, 2023Updated 2 years ago
- Proof of concept to test POODLE over TLS☆11Mar 13, 2015Updated 10 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Jun 26, 2021Updated 4 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆142Jan 25, 2022Updated 4 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Sep 20, 2014Updated 11 years ago
- Pentesting-related Bash Scripts☆12Jan 4, 2020Updated 6 years ago
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Aug 16, 2023Updated 2 years ago
- Essential tool for finding blind injection attacks.☆50Feb 6, 2019Updated 7 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- ☆106May 28, 2021Updated 4 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆141Apr 29, 2019Updated 6 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- An OSINT Metadata analyzing tool that filters through tags and creates reports☆118Mar 18, 2019Updated 6 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- Toolkit for implant attack of IoT devices☆137Sep 6, 2018Updated 7 years ago
- Get clients and access points.☆48Aug 28, 2019Updated 6 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Sep 9, 2019Updated 6 years ago
- Offensive Security recon tool☆91Aug 27, 2021Updated 4 years ago