matro7sh / Smersh
Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions.
☆217Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for Smersh
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆86Updated 2 weeks ago
- Quelques conseils autour des obligations légales, fiscales et juridique pour la pratique du Bug Bounty en France☆128Updated 8 months ago
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆79Updated 3 years ago
- Docker images of the Exegol project☆89Updated this week
- Outils ESD academy☆52Updated 2 years ago
- This tool allows to automatically test for Content Security Policy bypass payloads.☆38Updated 2 months ago
- A python tool to automate KeePass discovery and secret extraction.☆451Updated last week
- Memory mapping profiles for forensic analysis using volatility 2☆45Updated 2 years ago
- Run several volatility plugins at the same time☆108Updated 2 years ago
- ☆78Updated this week
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆120Updated 3 weeks ago
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆67Updated this week
- ☆17Updated 2 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆144Updated 11 months ago
- A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.☆80Updated 2 months ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆198Updated 11 months ago
- Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework☆164Updated last year
- Password spraying tool and Bloodhound integration☆213Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆464Updated 3 months ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆58Updated 2 years ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆134Updated this week
- Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all D…☆495Updated 3 months ago
- French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.☆57Updated last month
- A collection of Offensive Go packages.☆208Updated 2 years ago
- Research on malware creation and protection☆66Updated 3 years ago
- Generate graphs and charts based on password cracking result☆154Updated last year
- Local Privilege Escalation in polkit's pkexec☆72Updated 2 years ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆426Updated last week
- Enemies Of Symfony - Debug mode Symfony looter☆314Updated last month
- ☆42Updated 2 years ago