matro7sh / Smersh
Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions.
☆218Updated 7 months ago
Alternatives and similar repositories for Smersh:
Users that are interested in Smersh are comparing it to the libraries listed below
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆129Updated 5 months ago
- Docker images of the Exegol project☆104Updated this week
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆89Updated 2 weeks ago
- A collection of offensive Go packages inspired by different Go repositories.☆242Updated 5 months ago
- Password spraying tool and Bloodhound integration☆229Updated 3 months ago
- A python tool to automate KeePass discovery and secret extraction.☆482Updated 4 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆154Updated last week
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆374Updated 4 months ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆236Updated last week
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆80Updated 3 years ago
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆390Updated 2 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆543Updated 5 months ago
- Windows reverse shell GUI☆97Updated 3 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆351Updated 2 months ago
- This repository contains previous material necessary to opt for the OSEP (Evasion Techniques and Breaching Defenses) certification☆157Updated 4 years ago
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆97Updated last week
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆176Updated 2 years ago
- ☆183Updated last year
- msImpersonate - User account impersonation written in pure Python3☆107Updated 2 years ago
- Kraken, a modular multi-language webshell coded by @secu_x11☆538Updated last year
- ☆97Updated 3 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆299Updated last year
- Quelques conseils autour des obligations légales, fiscales et juridique pour la pratique du Bug Bounty en France☆135Updated 2 weeks ago
- Password spraying and bruteforcing tool for Active Directory Domain Services☆364Updated 5 months ago
- ☆17Updated 2 years ago
- Research on malware creation and protection☆65Updated 4 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated 8 months ago
- Simple HTTP listener for security testing☆113Updated 4 months ago
- Obtain a clean-cut architecture at the launch of a mission and run some tests ( subdomain search, fuzzing, make screenshots on a given pe…☆25Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆147Updated 2 months ago