matro7sh / SmershLinks
Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions.
☆218Updated 10 months ago
Alternatives and similar repositories for Smersh
Users that are interested in Smersh are comparing it to the libraries listed below
Sorting:
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆439Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆467Updated 10 months ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated this week
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆61Updated 3 years ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆89Updated 3 months ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆169Updated 3 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆303Updated 2 years ago
- Simple & Customizable DNS Data Exfiltrator☆110Updated 2 years ago
- A python tool to automate KeePass discovery and secret extraction.☆495Updated 7 months ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆555Updated 4 years ago
- Run several volatility plugins at the same time☆114Updated 2 years ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆136Updated 8 months ago
- ☆66Updated 3 years ago
- List of red team resources☆94Updated 7 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆296Updated 3 years ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆207Updated 11 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated 11 months ago
- A CLI tool to identify the hash type of a given hash.☆112Updated 2 years ago
- This project is aimed at freely providing technical guides on various hacking tools.☆117Updated last year
- GLPIScan is a vulnerability scanner for GLPI.☆26Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆152Updated 5 months ago
- Phishing Framework for Pentesters☆189Updated 2 years ago
- Docker images of the Exegol project☆110Updated this week
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆82Updated 4 years ago
- Password spraying tool and Bloodhound integration☆238Updated 6 months ago
- Simple HTTP listener for security testing☆116Updated 7 months ago
- A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.☆83Updated last month
- A WLAN red team framework.☆156Updated 9 months ago
- Malware vulnerability intel tool for third-party attackers☆120Updated 8 months ago