moloch-- / big-rainbowLinks
BigQuery based rainbow tables
☆13Updated 7 years ago
Alternatives and similar repositories for big-rainbow
Users that are interested in big-rainbow are comparing it to the libraries listed below
Sorting:
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 7 years ago
- Common Findings Database☆101Updated 6 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 9 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- Ucki's Recon & Enumeration Pack☆39Updated 9 years ago
- Burp Suite extension to perform Kerberos authentication☆106Updated last year
- Sparty - MS Sharepoint and Frontpage Auditing Tool [Unofficial]☆97Updated 12 years ago
- Shell script for converting an input file containing one or more sslscan results into HTML tables.☆13Updated 5 years ago
- An automated SMB relay exploitation script.☆153Updated 9 years ago
- Easy 802.1Q VLAN Hopping☆80Updated last year
- Miscellaneous pentesting scripts for OSCP☆59Updated 7 years ago
- ☆104Updated 6 years ago
- PoC for an adaptive parallelised DNS prober☆109Updated 3 years ago
- ☆57Updated 5 years ago
- A simplified SMB Email Client Attack script used for pentests.☆29Updated 7 years ago
- Loot email addresses from commit entries☆56Updated 3 years ago
- A DNS connectback shell executed by strings in payloads.txt☆102Updated 2 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆97Updated 9 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆170Updated 7 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆77Updated 11 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 7 years ago
- Stargate☆96Updated 9 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- Hacking challenges☆31Updated 8 years ago
- Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurat…☆87Updated 9 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Updated 9 years ago
- Plugin for keepnote to import a XML nmap file☆27Updated 9 years ago
- Extreme Vulnerable Node Application☆95Updated 7 years ago
- Snarf man-in-the-middle / relay suite☆206Updated 9 years ago