matro7sh / SmershView external linksLinks
Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions.
☆218Aug 26, 2024Updated last year
Alternatives and similar repositories for Smersh
Users that are interested in Smersh are comparing it to the libraries listed below
Sorting:
- Obtain a clean-cut architecture at the launch of a mission and run some tests ( subdomain search, fuzzing, make screenshots on a given pe…☆26Jul 18, 2023Updated 2 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆64Feb 6, 2022Updated 4 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- ☆37Oct 3, 2023Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆73Jan 6, 2022Updated 4 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Dec 17, 2024Updated last year
- An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.☆183Feb 5, 2026Updated last week
- Overlord - Red Teaming Infrastructure Automation☆628May 28, 2024Updated last year
- Research on malware creation and protection☆64Jan 2, 2021Updated 5 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- FACT is a tool to collect, process and visualise forensic data from clusters of machines running in the cloud or on-premise.☆17Aug 30, 2024Updated last year
- Swiss army knife Webserver in Golang. Keep simple like the python SimpleHTTPServer but with many features☆199Mar 27, 2025Updated 10 months ago
- Run Powershell without software restrictions.☆282Sep 8, 2021Updated 4 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆28Feb 1, 2026Updated last week
- A penetration testing and vulnerability management application written using the powerful django framework.☆30Nov 22, 2023Updated 2 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- LDAP library for auditing MS AD☆485Oct 26, 2025Updated 3 months ago
- automated password spraying tool☆148Jun 15, 2021Updated 4 years ago
- A C2 post-exploitation framework☆483Jan 24, 2024Updated 2 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆309Jul 4, 2023Updated 2 years ago
- Cervantes is an open-source, collaborative platform designed specifically for pentesters and red teams. It serves as a comprehensive mana…☆433Feb 8, 2026Updated last week
- Lookup for interesting stuff in SMB shares☆150Jun 16, 2023Updated 2 years ago
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆484Sep 24, 2025Updated 4 months ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- Kerberoast attack -pure python-☆435Nov 30, 2023Updated 2 years ago
- ☆170May 20, 2021Updated 4 years ago
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 2 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆178Nov 10, 2022Updated 3 years ago
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- User enumeration with Microsoft Teams API☆175Jul 9, 2021Updated 4 years ago
- Nmap Web Dashboard and Reporting☆34May 1, 2022Updated 3 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Oct 15, 2020Updated 5 years ago
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆220Aug 23, 2022Updated 3 years ago
- ☆54Nov 5, 2024Updated last year
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago