lair-framework / lairLinks
Lair is a reactive attack collaboration framework and web application built with meteor.
☆384Updated 5 years ago
Alternatives and similar repositories for lair
Users that are interested in lair are comparing it to the libraries listed below
Sorting:
- Auto Domain Admin and Network Exploitation.☆300Updated 7 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆285Updated 4 years ago
- ☆427Updated 8 years ago
- ☆279Updated 5 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆503Updated 5 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆355Updated 2 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆306Updated 5 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Updated 8 years ago
- Open source offensive security platform for red team, by red team.☆386Updated 7 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆254Updated 9 years ago
- This script communicates with the Nessus API in an attempt to help with automating scans. Depending on the flag issued with the script, y…☆214Updated 5 years ago
- Vulnerability Compliance Report Tool used to parse Nessus files into html reports created by SynerComm, Inc.☆166Updated 6 years ago
- Next Generation Firewall Audit and Bypass Tool☆267Updated 8 years ago
- Automated Responder/secretsdump.py cracking☆186Updated 9 years ago
- ☆241Updated 5 years ago
- Kvasir: Penetration Test Data Management☆430Updated 6 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆366Updated last year
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆254Updated 8 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆382Updated 7 years ago
- Generate vulnerable virtual machines on the fly (current team development is taking place in the cliffe/SecGen fork)☆317Updated 6 years ago
- Mass scanner for the Java serialize bug☆152Updated 2 months ago
- PwnWiki - The notes section of the pentesters mind.☆564Updated 6 years ago
- Common Findings Database☆101Updated 6 years ago
- Get your APT on using social media as a tool for data exfiltration.☆147Updated 2 years ago
- Respounder detects presence of responder in the network.☆318Updated 6 years ago
- Fast http dead file finder.☆218Updated 2 months ago
- Various Cheat Sheets related to development and security☆143Updated 5 years ago
- Duct Tape Command and Control!☆96Updated last month
- A repository for large scripts from my book.☆161Updated 3 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆124Updated 6 years ago