Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.
☆26Feb 7, 2017Updated 9 years ago
Alternatives and similar repositories for Pillage
Users that are interested in Pillage are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pentester Chef cookbook - Install & configures some cool stuff for pentesting☆11Jun 1, 2020Updated 5 years ago
- ☆51Jun 24, 2016Updated 9 years ago
- stuff from my ToorCon 2015 talk☆14Oct 27, 2015Updated 10 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- Security Logon Event Analysis Tools - a collection of scripts for collecting, parsing, and analyzing logon events from Windows Security L…☆16Jun 22, 2016Updated 9 years ago
- Scans SMB for Vuln Assessment☆17Mar 4, 2017Updated 9 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Feb 12, 2015Updated 11 years ago
- Created on 10th August 2017. Purpose of this Project is to note down every useful object I gained during the time I spent working on OSCP…☆19Feb 26, 2018Updated 8 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Web Sight Front-end Community Edition☆24May 25, 2020Updated 5 years ago
- The purpose of this repository is to provide a collaboration space for working on Petya/NoPetya tools specific to ICS☆18Jun 30, 2017Updated 8 years ago
- A simpe decoder to decode requests/responses made by PokemonGo in burp☆24Aug 4, 2016Updated 9 years ago
- ☆15May 14, 2019Updated 6 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Dec 11, 2015Updated 10 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- Social Engineering Toys☆37Feb 1, 2016Updated 10 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago
- An automated SMB relay exploitation script.☆153Oct 11, 2016Updated 9 years ago
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- A proof of concept for delivering webbugs via AWS lambda☆46Sep 10, 2018Updated 7 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Feb 20, 2019Updated 7 years ago
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆31Nov 6, 2019Updated 6 years ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 9 years ago
- Experimental PowerShell tools for Penetration Testing / Red Teaming☆22Jun 28, 2017Updated 8 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆41Mar 24, 2018Updated 8 years ago
- Post-exploitation NTLM password hash extractor☆19Apr 7, 2021Updated 4 years ago
- Offsec PWB Lab Tools☆13Nov 14, 2013Updated 12 years ago
- ☆23Mar 17, 2024Updated 2 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- Python tools for interacting with a DarkComet Client☆54Aug 4, 2015Updated 10 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Dec 16, 2015Updated 10 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago