matro7sh / SmershLinks
Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions.
☆218Updated 10 months ago
Alternatives and similar repositories for Smersh
Users that are interested in Smersh are comparing it to the libraries listed below
Sorting:
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆82Updated 4 years ago
- Quelques conseils autour des obligations légales, fiscales et juridique pour la pratique du Bug Bounty en France☆137Updated 2 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆90Updated 2 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆150Updated 4 months ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆136Updated 7 months ago
- Docker images of the Exegol project☆106Updated this week
- Run several volatility plugins at the same time☆114Updated 2 years ago
- A python tool to automate KeePass discovery and secret extraction.☆491Updated 6 months ago
- Password spraying tool and Bloodhound integration☆237Updated 5 months ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆250Updated 2 months ago
- This tool allows to automatically test for Content Security Policy bypass payloads.☆44Updated 9 months ago
- Obtain a clean-cut architecture at the launch of a mission and run some tests ( subdomain search, fuzzing, make screenshots on a given pe…☆25Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆466Updated 10 months ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆437Updated last year
- A python script to dump files and folders remotely from a Windows SMB share.☆227Updated 4 months ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆221Updated 3 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework☆168Updated 2 years ago
- Windows for Red Teamers☆126Updated 3 years ago
- Azure mindmap for penetration tests☆186Updated last year
- Memory mapping profiles for forensic analysis using volatility 2☆48Updated 2 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆61Updated 3 years ago
- Password spraying and bruteforcing tool for Active Directory Domain Services☆375Updated 7 months ago
- 🌯 Give me a web shell, I'll give you a terminal.☆188Updated 3 years ago
- Pentest Report Generator☆410Updated 2 weeks ago
- A collection of offensive Go packages inspired by different Go repositories.☆242Updated 7 months ago
- Enemies Of Symfony - Debug mode Symfony looter☆335Updated 8 months ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Kubernetes exploitation tool☆360Updated 11 months ago
- ☆17Updated 2 years ago