localh0t / m4ngl3m3
Common password pattern generator using strings list
☆129Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for m4ngl3m3
- SSH User Enumeration Script in Python Using The Timing Attack☆91Updated 8 years ago
- Some scripts and exploits☆142Updated 6 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- Penetration testing scripts☆143Updated 6 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆167Updated 7 years ago
- For all your network pentesting needs☆150Updated 4 months ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60Updated 5 years ago
- Tool made to automate tasks of pentesting.☆165Updated 5 years ago
- A tool to generate media files with malicious metadata☆124Updated 5 years ago
- Using IPv6 to Bypass Security☆93Updated 11 months ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆234Updated last year
- WhiteBox CMS analysis☆68Updated last year
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- MS17-010☆63Updated 7 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆119Updated last year
- Deploy payloads to *Nix systems en masse☆105Updated 4 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 6 years ago
- Linux Privilege Escalation Tool☆180Updated 5 years ago
- OFFICE DDEAUTO Payload Generation script☆125Updated 3 years ago
- Miscellaneous pentesting scripts for OSCP☆57Updated 5 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆74Updated 10 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- locate and attack Lync/Skype for Business☆334Updated last month
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆154Updated 6 months ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 4 years ago
- SMB Relay Attack Script☆148Updated 5 years ago