matro7sh / Smersh
Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions.
☆218Updated 5 months ago
Alternatives and similar repositories for Smersh:
Users that are interested in Smersh are comparing it to the libraries listed below
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆87Updated 2 months ago
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆80Updated 3 years ago
- Docker images of the Exegol project☆94Updated last week
- Quelques conseils autour des obligations légales, fiscales et juridique pour la pratique du Bug Bounty en France☆130Updated 10 months ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆122Updated 3 months ago
- Outils ESD academy☆55Updated 2 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆295Updated last year
- This tool allows to automatically test for Content Security Policy bypass payloads.☆39Updated 4 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆145Updated last month
- Repository contenant les aides-mémoires ESD academy☆18Updated 4 years ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆136Updated 2 months ago
- This Python script can be used to bypass IP source restrictions using HTTP headers.☆380Updated 9 months ago
- ☆87Updated last week
- VULNSPY regularly retrieves the latest alerts published by the CERT-FR and the related vulnerabilities with their CVSS score and allows y…☆38Updated 2 years ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆203Updated last year
- Documentation for Exegol☆56Updated last month
- msImpersonate - User account impersonation written in pure Python3☆107Updated 2 years ago
- A full CTF Website Server & Frontend | Extremely customizable☆56Updated 9 months ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆67Updated 10 months ago
- Pentest Report Generator☆391Updated this week
- ☆17Updated 2 years ago
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆366Updated 2 months ago
- Obtain a clean-cut architecture at the launch of a mission and run some tests ( subdomain search, fuzzing, make screenshots on a given pe…☆25Updated last year
- SNMPv3 Authentication Bruteforcer☆35Updated 3 years ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆504Updated 2 months ago
- French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.☆58Updated 3 months ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆464Updated 5 months ago
- Pentest report framework without data send☆15Updated 4 months ago
- A python tool to automate KeePass discovery and secret extraction.☆464Updated last month
- You should think about upgrading your GLPI now☆23Updated last year