mindedsecurity / msakLinks
The MSAK is a tool written in Python to help discovering and testing exposed standard and custom services of ModBus Servers/Slaves over Serial or TCP/IP connections.
☆18Updated last year
Alternatives and similar repositories for msak
Users that are interested in msak are comparing it to the libraries listed below
Sorting:
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆49Updated 3 months ago
- Hijack a slack bot to phish your way in☆55Updated 2 months ago
- Autonomous AI C2☆31Updated 11 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated 10 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆65Updated last year
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated last month
- CaptainCredz is a modular and discreet password-spraying tool.☆114Updated 3 weeks ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆33Updated last month
- vhost scanning☆36Updated last year
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆32Updated this week
- A collection of tools that I use in CTF's or for assessments☆100Updated 4 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆68Updated 3 weeks ago
- Burp Suite extension for testing Passkey systems.☆69Updated 2 months ago
- Enumerate AWS permissions and resources.☆69Updated 3 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 8 months ago
- All kinds of tiny shells☆58Updated 2 years ago
- Artifact monitoring that ensures fairplay☆75Updated 4 months ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Updated 5 months ago
- A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting t…☆47Updated 8 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆83Updated 2 months ago
- FrogPost: postMessage Security Testing Tool☆80Updated last month
- A public, open source physical security methodology☆46Updated last year
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated 9 months ago
- Next generation fireprox AWS API endpoint creation utility.☆52Updated 2 years ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆47Updated 3 weeks ago
- ☆77Updated last year
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆13Updated 4 months ago
- Living Off Security Tools☆45Updated 8 months ago