muraenateam / necrobrowser-old-goLinks
☆143Updated 5 years ago
Alternatives and similar repositories for necrobrowser-old-go
Users that are interested in necrobrowser-old-go are comparing it to the libraries listed below
Sorting:
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆162Updated 5 years ago
- A framework for stealthy domain reconnaissance☆303Updated 3 years ago
- NebulousAD automated credential auditing tool.☆155Updated 5 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Updated 11 months ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆306Updated 4 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆386Updated 6 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆395Updated 5 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆167Updated 7 years ago
- a CLI for ephemeral penetration testing☆13Updated 5 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆293Updated 7 months ago
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.☆983Updated 6 months ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- ☆283Updated 7 years ago
- DomainCheck is designed to assist operators with monitoring changes related to their domain names. This includes negative changes in cate…☆240Updated 6 months ago
- Rapid Attack Infrastructure (RAI)☆305Updated 6 months ago
- Pypykatz server☆125Updated 6 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆378Updated 5 years ago
- This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team memb…☆214Updated 6 years ago
- This is a weaponized WSUS exploit☆285Updated 2 years ago
- locate and attack Lync/Skype for Business☆338Updated 8 months ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆67Updated 3 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆161Updated 5 years ago
- Penetration testing scripts☆143Updated 7 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆258Updated 4 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Updated 4 years ago
- Remote Recon and Collection☆452Updated 7 years ago
- Phishing Scenarios Used for Phishing Frenzy☆207Updated 5 years ago
- Search for categorized domain☆446Updated 6 years ago
- Collection of social engineering payloads☆296Updated 7 years ago
- Respounder detects presence of responder in the network.☆316Updated 5 years ago