matro7sh / SmershLinks
Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions.
☆218Updated last year
Alternatives and similar repositories for Smersh
Users that are interested in Smersh are comparing it to the libraries listed below
Sorting:
- Run several volatility plugins at the same time☆114Updated 2 years ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆137Updated 10 months ago
- ☆17Updated 3 years ago
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆85Updated 4 years ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆170Updated 4 years ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆467Updated last year
- A CLI tool to identify the hash type of a given hash.☆112Updated 3 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆303Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated 10 months ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆442Updated last year
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆94Updated 5 months ago
- A WLAN red team framework.☆157Updated 10 months ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆62Updated 3 years ago
- GLPIScan is a vulnerability scanner for GLPI.☆27Updated 2 years ago
- Phishing Framework for Pentesters☆197Updated 2 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆153Updated 6 months ago
- ☆119Updated 2 years ago
- For pentesters who don't wanna leave their terminals.☆183Updated 4 years ago
- A Python based GUI for volatility. Made by keeping CTFs in focus. Basic memory forensics in Clicks.☆45Updated 3 years ago
- Emulate and Dissect MSF and *other* attacks☆143Updated last year
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Updated last week
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆279Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆161Updated last week
- Simple & Customizable DNS Data Exfiltrator☆110Updated 2 years ago
- A python tool to automate KeePass discovery and secret extraction.☆501Updated 8 months ago
- A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.☆85Updated 2 months ago
- Wordlists handcrafted (and automated) with ♥☆217Updated 3 weeks ago
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- ☆100Updated 3 years ago
- ☆67Updated 3 years ago