mainframed / psikotikLinks
PSIKOTIK TSO User Enumerator
☆17Updated 8 years ago
Alternatives and similar repositories for psikotik
Users that are interested in psikotik are comparing it to the libraries listed below
Sorting:
- CATSO/JCL wrapper for z/OS FTP logic attack☆26Updated 8 months ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- ☆12Updated 2 months ago
- ☆27Updated 5 years ago
- Here comes the paintrain!☆11Updated 9 years ago
- Custom scripts used during the scenario☆21Updated 4 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- Mainframe TN3270 unencrypted TSO session user ID and password sniffer☆50Updated 2 years ago
- Mainframe Transfer: PROTOCOL☆28Updated 4 years ago
- Oracle Attacks Tool☆13Updated 9 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- NMAP Patches and NSE Scripts☆19Updated 12 years ago
- Suite for Information gathering☆12Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆22Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- A collection of interesting REXX scripts to ease the life a mainframe pentester☆27Updated 8 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 7 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 11 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- Automated script to search in SMB protocol for availables pipe names☆23Updated 7 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 11 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- TN3270 MitM proxy and so much more☆14Updated 7 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆40Updated 7 years ago
- z/OS Mainframe TSO Logon panel account enumerator and brute forcer☆30Updated 12 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago