mandiant / gocrack-uiLinks
The User Interface for GoCrack
☆88Updated 2 months ago
Alternatives and similar repositories for gocrack-ui
Users that are interested in gocrack-ui are comparing it to the libraries listed below
Sorting:
- Powershell Empire Persistence finder☆119Updated 8 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- Enterprise WPA Wireless Tool Suite☆87Updated 3 years ago
- Get email notification when Virus Total has a copy of your binary.☆168Updated 5 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆72Updated 10 years ago
- A collection of Burp Suite extensions☆30Updated 9 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆56Updated last year
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Updated 8 years ago
- Plaintext Password harvesting from Azure Windows VMs☆68Updated 7 years ago
- SMB Relay Attack Script☆146Updated 7 years ago
- NCC Group Ransomware Simulator☆69Updated 9 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆71Updated 8 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Updated 7 years ago
- No-Script Automation Tool☆56Updated 7 years ago
- Attack Knowledge Base☆101Updated 8 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Updated 6 years ago
- unix wildcard attacks☆136Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆105Updated 3 years ago
- Intelligent threat hunter and phishing servers☆47Updated 7 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆128Updated 7 years ago
- Scripts for running Responder.py in an Android (rooted) device.☆65Updated 9 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆150Updated 7 years ago
- A powershell script for creating a Windows honeyport.☆90Updated 10 months ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 10 years ago
- Vulnerability scanner based on vulners.com audit API☆65Updated 7 years ago
- Creates dictionaries based on Wikipedia titles☆63Updated 6 years ago
- tools for analyzing strings from password lists☆58Updated 3 years ago
- WhiteBox CMS analysis☆68Updated 2 years ago