nccgroup / lapith
A simple Nessus results viewer
☆49Updated 11 years ago
Alternatives and similar repositories for lapith:
Users that are interested in lapith are comparing it to the libraries listed below
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- ☆46Updated 7 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- ☆19Updated 7 years ago
- PHDAYS |||☆17Updated 11 years ago
- ☆58Updated 7 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Updated 8 years ago
- Easy Window domain access☆51Updated 11 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- A BurpSuite extension for lair☆28Updated 7 years ago
- ☆53Updated 10 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Updated 7 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 8 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- Experimental PowerShell tools for Penetration Testing / Red Teaming☆22Updated 7 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆63Updated 9 years ago
- Mixing up CVE and MS like a pro☆25Updated 8 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- Mimikatz HashClash☆12Updated 9 years ago
- Powershell Persistence Locator☆66Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Custom stagers with python encrypting proxy☆39Updated 9 years ago
- MS15-076 Privilege Escalation☆16Updated 9 years ago