Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.
☆26Feb 7, 2017Updated 9 years ago
Alternatives and similar repositories for Pillage
Users that are interested in Pillage are comparing it to the libraries listed below
Sorting:
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- stuff from my ToorCon 2015 talk☆14Oct 27, 2015Updated 10 years ago
- Pentester Chef cookbook - Install & configures some cool stuff for pentesting☆11Jun 1, 2020Updated 5 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- ☆51Jun 24, 2016Updated 9 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- Security Logon Event Analysis Tools - a collection of scripts for collecting, parsing, and analyzing logon events from Windows Security L…☆16Jun 22, 2016Updated 9 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Dec 11, 2015Updated 10 years ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆32Nov 6, 2019Updated 6 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 8 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 8 years ago
- The purpose of this repository is to provide a collaboration space for working on Petya/NoPetya tools specific to ICS☆18Jun 30, 2017Updated 8 years ago
- Quick script to set up VPN server and reverse VPN for Nethunter☆38Aug 22, 2016Updated 9 years ago
- An automated SMB relay exploitation script.☆153Oct 11, 2016Updated 9 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- ☆14Aug 12, 2015Updated 10 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Scapy hands-on at #GreHack16☆16Nov 19, 2016Updated 9 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Jul 20, 2019Updated 6 years ago
- Scans SMB for Vuln Assessment☆17Mar 4, 2017Updated 9 years ago
- Social Engineering Toys☆37Feb 1, 2016Updated 10 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆41Mar 24, 2018Updated 7 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- devops scripts☆33Dec 8, 2016Updated 9 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Jan 4, 2017Updated 9 years ago
- Post-exploitation NTLM password hash extractor☆19Apr 7, 2021Updated 4 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- Experimental PowerShell tools for Penetration Testing / Red Teaming☆22Jun 28, 2017Updated 8 years ago
- Packaging audit toolkit using vulners.com vulnerability database☆20Apr 9, 2018Updated 7 years ago
- Open-Source Phishing Toolkit☆20May 23, 2021Updated 4 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- Small utility package for manipulating Windows process tokens☆26Apr 26, 2022Updated 3 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Feb 12, 2015Updated 11 years ago