matro7sh / SmershLinks
Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions.
☆218Updated 11 months ago
Alternatives and similar repositories for Smersh
Users that are interested in Smersh are comparing it to the libraries listed below
Sorting:
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆61Updated 3 years ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆136Updated 9 months ago
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆84Updated 4 years ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆90Updated 4 months ago
- A CLI tool to identify the hash type of a given hash.☆112Updated 2 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆153Updated 5 months ago
- Run several volatility plugins at the same time☆114Updated 2 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆43Updated last year
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆303Updated 2 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- ☆119Updated 2 years ago
- Simple & Customizable DNS Data Exfiltrator☆110Updated 2 years ago
- Docker images of the Exegol project☆111Updated this week
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- ☆66Updated 3 years ago
- A WLAN red team framework.☆157Updated 10 months ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆170Updated 3 years ago
- Browser extension that extracts users from LinkedIn company pages☆160Updated 2 years ago
- A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.☆83Updated last month
- This repository contains previous material necessary to opt for the OSEP (Evasion Techniques and Breaching Defenses) certification☆168Updated 4 years ago
- GLPIScan is a vulnerability scanner for GLPI.☆26Updated 2 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆147Updated last year
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 4 years ago
- Phishing Framework for Pentesters☆194Updated 2 years ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- Just an AV slayer. Nothing special ;)☆216Updated 2 years ago
- A Python based GUI for volatility. Made by keeping CTFs in focus. Basic memory forensics in Clicks.☆45Updated 3 years ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆189Updated 5 months ago
- a map for the azure oriented pentests☆66Updated 2 years ago