maliciousgroup / SecretSmasher
SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords
☆12Updated 4 years ago
Related projects: ⓘ
- Exchange your privileges for Domain Admin privs by abusing Exchange☆15Updated 4 years ago
- Shell hunter for AF☆34Updated 2 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆11Updated 4 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Active Directory information dumper via LDAP☆11Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆14Updated 4 years ago
- ☆11Updated 3 years ago
- ☆22Updated this week
- ☆20Updated this week
- ☆29Updated this week
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 10 months ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 2 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆12Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 3 years ago
- ☆10Updated this week
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 3 years ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆18Updated 4 years ago
- Simple C2 over the Trello API☆37Updated last year
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Malicious Macro attack techniques for red teamers☆15Updated 3 years ago
- miscellaneous sploit scripts/hacks☆13Updated 2 months ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆17Updated 3 years ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆13Updated 2 years ago
- ☆16Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago