muraenateam / necrobrowser-old-go
☆142Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for necrobrowser-old-go
- NebulousAD automated credential auditing tool.☆154Updated 4 years ago
- A framework for stealthy domain reconnaissance☆293Updated 3 years ago
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.☆928Updated last week
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆304Updated 4 years ago
- DomainCheck is designed to assist operators with monitoring changes related to their domain names. This includes negative changes in cate…☆231Updated this week
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆245Updated 5 months ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆62Updated 2 years ago
- Pypykatz server☆124Updated 5 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆234Updated last year
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆161Updated 5 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆168Updated 4 years ago
- For all your network pentesting needs☆150Updated 4 months ago
- locate and attack Lync/Skype for Business☆334Updated last month
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆373Updated 3 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Updated 6 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆391Updated 4 years ago
- a CLI for ephemeral penetration testing☆7Updated 4 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆255Updated 3 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆107Updated 6 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆158Updated 5 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Updated 4 years ago
- Various Cheat Sheets☆179Updated 3 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆286Updated 3 weeks ago
- Slides from various talks that I've given over the years☆117Updated last year
- The aim of Wordsmith is to assist with creating tailored wordlists. This is mostly based on geolocation.☆164Updated 6 years ago
- Remote Recon and Collection☆447Updated 7 years ago
- Responsive Command and Control System☆101Updated 2 years ago