joda32 / got-respondedLinks
A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)
☆36Updated 6 years ago
Alternatives and similar repositories for got-responded
Users that are interested in got-responded are comparing it to the libraries listed below
Sorting:
- A Report Generation Tool for Security Assessment☆65Updated 6 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Updated 4 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆67Updated 3 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆45Updated 4 years ago
- Password spraying script and helper for creating password lists☆34Updated 5 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- Search drives for documents containing passwords☆65Updated 11 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 6 years ago
- ☆58Updated 5 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Updated 3 years ago
- One line PS scripts that may come handy during your network assesment☆77Updated 5 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆67Updated 7 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Updated last year
- ☆98Updated 6 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆49Updated 6 years ago
- Enterprise WPA Wireless Tool Suite☆86Updated 3 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- Automated 802.1x Bypass☆86Updated 5 years ago
- Enumerate RIDs using pure Python☆33Updated last year
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆77Updated 11 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated 2 years ago
- AWS S3 Bucket/Object Finder☆25Updated 8 years ago
- API testing tool written with Python☆56Updated 8 years ago
- Tool for password spraying RDP☆98Updated 7 years ago
- Fully-featured spear-phishing toolkit - web front-end☆52Updated 10 months ago