matro7sh / SmershLinks
Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions.
☆218Updated last year
Alternatives and similar repositories for Smersh
Users that are interested in Smersh are comparing it to the libraries listed below
Sorting:
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆139Updated 11 months ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆168Updated 4 years ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆94Updated 6 months ago
- Browser extension that extracts users from LinkedIn company pages☆161Updated 2 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆442Updated last year
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆305Updated 2 years ago
- Just an AV slayer. Nothing special ;)☆217Updated 2 years ago
- A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.☆86Updated 3 months ago
- Run several volatility plugins at the same time☆114Updated 2 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆63Updated 3 years ago
- Simple HTTP listener for security testing☆116Updated 10 months ago
- ☆119Updated 3 years ago
- ☆67Updated 3 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆144Updated last week
- Password spraying tool and Bloodhound integration☆245Updated 9 months ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆469Updated last year
- GLPIScan is a vulnerability scanner for GLPI.☆27Updated 2 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆46Updated last year
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- Script collection to bypass Network Access Control (NAC, 802.1x)☆326Updated 5 months ago
- Example reports from prior years of the Collegiate Penetration Testing Competition☆152Updated 2 months ago
- A CLI tool to identify the hash type of a given hash.☆112Updated 3 years ago
- Simple & Customizable DNS Data Exfiltrator☆112Updated 2 years ago
- For pentesters who don't wanna leave their terminals.☆184Updated 4 years ago
- Phishing Framework for Pentesters☆198Updated 2 years ago
- A WLAN red team framework.☆154Updated last year
- Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an…☆407Updated 7 months ago
- A set of recipes useful in pentesting and red teaming scenarios☆144Updated 2 years ago
- ☆48Updated 3 years ago