joda32 / got-respondedLinks
A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)
☆36Updated 6 years ago
Alternatives and similar repositories for got-responded
Users that are interested in got-responded are comparing it to the libraries listed below
Sorting:
- Python-based CLI Password Analyser (Reporting Tool)☆32Updated 4 years ago
- Password spraying script and helper for creating password lists☆34Updated 5 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆67Updated 3 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- ☆81Updated 6 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- ☆58Updated 5 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Updated 4 years ago
- Tool for password spraying RDP☆98Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- AWS S3 Bucket/Object Finder☆25Updated 8 years ago
- Search drives for documents containing passwords☆65Updated 11 years ago
- Enumerate RIDs using pure Python☆32Updated last year
- ☆98Updated 6 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆49Updated 6 years ago
- Enterprise WPA Wireless Tool Suite☆87Updated 3 years ago
- One line PS scripts that may come handy during your network assesment☆78Updated 5 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Updated 5 years ago
- Clean public password dump files and store in ELK☆38Updated 7 years ago
- Search public IP owner through ARIN☆61Updated 7 months ago
- The goal of this program is to quickly pull and install repos from its list☆41Updated 3 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆67Updated 7 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 6 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 7 years ago
- Responsive Command and Control System☆102Updated 3 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 3 years ago
- ☆78Updated 8 years ago
- Samba, NFS shares spider and grepper☆71Updated 7 years ago
- Fully-featured spear-phishing toolkit - web front-end☆52Updated 11 months ago