mandiant / gocrack-ui
The User Interface for GoCrack
☆86Updated last month
Alternatives and similar repositories for gocrack-ui:
Users that are interested in gocrack-ui are comparing it to the libraries listed below
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 2 months ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆56Updated 10 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆127Updated 7 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆35Updated 5 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- A command line tool for creating malicious outlook rules☆160Updated 6 years ago
- Powershell Empire Persistence finder☆117Updated 8 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- Created by Jeffrey Martin via the GitHub Connector☆49Updated last year
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- ☆59Updated 5 years ago
- Attack Knowledge Base☆100Updated 7 years ago
- Easy 802.1Q VLAN Hopping☆80Updated 6 months ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- ☆61Updated 6 years ago
- ☆59Updated 4 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆106Updated 7 years ago
- Speeds up the extraction of password hashes from ntds.dit files. For use with the ntdsxtract project or the dshash script☆27Updated 11 months ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- A ton of helpful tools☆39Updated 3 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆81Updated 7 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆68Updated 7 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Updated 10 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Collection of tools for privesc on Linux☆34Updated 11 years ago
- unix wildcard attacks☆132Updated 6 years ago
- ☆98Updated 5 years ago
- Modular tool to test exfiltration techniques.☆36Updated 7 years ago