matro7sh / SmershLinks
Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions.
☆218Updated last year
Alternatives and similar repositories for Smersh
Users that are interested in Smersh are comparing it to the libraries listed below
Sorting:
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Run several volatility plugins at the same time☆117Updated 3 years ago
- A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.☆90Updated last week
- ☆120Updated 3 years ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆142Updated last year
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆309Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- Just an AV slayer. Nothing special ;)☆216Updated 3 years ago
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆178Updated 5 years ago
- A CLI tool to identify the hash type of a given hash.☆113Updated 3 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆64Updated 3 years ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆473Updated last year
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆102Updated 10 months ago
- Simple & Customizable DNS Data Exfiltrator☆113Updated 2 years ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆168Updated 4 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆146Updated 2 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆48Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆165Updated 5 months ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆448Updated 2 years ago
- Browser extension that extracts users from LinkedIn company pages☆164Updated 2 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 3 years ago
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆88Updated 4 years ago
- This project is aimed at freely providing technical guides on various hacking tools.☆117Updated last year
- A WLAN red team framework.☆155Updated this week
- Lookup for interesting stuff in SMB shares☆151Updated 2 years ago
- Windows for Red Teamers☆127Updated 3 years ago
- For pentesters who don't wanna leave their terminals.☆183Updated 4 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆180Updated 9 months ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 4 years ago
- GLPIScan is a vulnerability scanner for GLPI.☆27Updated 2 years ago