mtkirby / slimshimLinks
☆28Updated 5 years ago
Alternatives and similar repositories for slimshim
Users that are interested in slimshim are comparing it to the libraries listed below
Sorting:
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 10 years ago
- OCL Hashcat username to decrypted password recombiner☆15Updated 10 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 6 months ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆35Updated 2 years ago
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago
- Collection of rules and debug data for hashcat☆19Updated 7 years ago
- Automated enumeration☆30Updated 4 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- Nmap enumeration and script scan automation script☆38Updated 2 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 10 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Updated 10 years ago
- ☆57Updated 10 years ago
- A bunch of scripts I use to work with urlscan.io☆34Updated 5 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- NCC Group Ransomware Simulator☆69Updated 8 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆106Updated 11 years ago
- This is a bash script to bypass 802.1x NAC☆97Updated 2 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- A ton of helpful tools☆39Updated 3 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- Rogue AP killer☆89Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Lair Framework dockerized.☆38Updated 4 years ago