muraenateam / necrobrowser-old-goLinks
☆143Updated 6 years ago
Alternatives and similar repositories for necrobrowser-old-go
Users that are interested in necrobrowser-old-go are comparing it to the libraries listed below
Sorting:
- A framework for stealthy domain reconnaissance☆303Updated 3 years ago
- a CLI for ephemeral penetration testing☆13Updated 5 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆162Updated 5 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆306Updated 4 years ago
- Pypykatz server☆125Updated 6 years ago
- For all your network pentesting needs☆154Updated last year
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆395Updated 5 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆258Updated 4 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆293Updated 7 months ago
- Remote Recon and Collection☆454Updated 7 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆386Updated 6 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆67Updated 3 years ago
- This repo contains my custom scripts for Penetration Testing and Red Team Assessments. I will keep on updating this repo as and when I ge…☆352Updated 6 years ago
- Search for categorized domain☆446Updated 6 years ago
- NebulousAD automated credential auditing tool.☆155Updated 5 years ago
- Rapid Attack Infrastructure (RAI)☆305Updated 7 months ago
- DomainCheck is designed to assist operators with monitoring changes related to their domain names. This includes negative changes in cate…☆243Updated 7 months ago
- Phishing Scenarios Used for Phishing Frenzy☆208Updated 5 years ago
- ProxyDock is a Dockerfile and Bash script that converts your OpenVPN files into local proxies.☆137Updated 5 years ago
- ☆224Updated last year
- 3 tools that work together to simplify reconaissance of Windows File Shares☆167Updated 7 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆318Updated 4 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- Responsive Command and Control System☆103Updated 2 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Updated last year
- (extensible) Data Exfiltration Toolkit (DET)☆161Updated 5 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Updated 4 years ago
- penetration testing scripts☆136Updated 5 years ago