localh0t / m4ngl3m3Links
Common password pattern generator using strings list
☆132Updated 4 years ago
Alternatives and similar repositories for m4ngl3m3
Users that are interested in m4ngl3m3 are comparing it to the libraries listed below
Sorting:
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆170Updated 7 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 4 years ago
- Phishing Template Generation Made Easy☆164Updated 7 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆121Updated last year
- Some scripts and exploits☆146Updated 6 years ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60Updated 6 years ago
- For all your network pentesting needs☆154Updated 11 months ago
- An implementation of NSA's ExplodingCan exploit in Python☆263Updated 7 years ago
- Domain user enumeration tool☆215Updated last year
- Wavestone's web interface for password cracking with hashcat☆170Updated 3 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 7 years ago
- OFFICE DDEAUTO Payload Generation script☆128Updated 4 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆93Updated 8 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆286Updated 6 years ago
- MS17-010☆63Updated 7 years ago
- Penetration testing scripts☆143Updated 7 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- Linux Local Enumeration Script☆79Updated 4 years ago
- Samba, NFS shares spider and grepper☆70Updated 6 years ago
- Port of eternal blue exploits to powershell☆150Updated 8 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆157Updated last year
- SMB Relay Attack Script☆149Updated 6 years ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 4 years ago
- Check for valid credentials across a network over SMB☆263Updated last year
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆203Updated last year
- Search drives for documents containing passwords☆63Updated 10 years ago