nccgroup / vlan-hopping---froggerView external linksLinks
Easy 802.1Q VLAN Hopping
☆390Feb 24, 2016Updated 9 years ago
Alternatives and similar repositories for vlan-hopping---frogger
Users that are interested in vlan-hopping---frogger are comparing it to the libraries listed below
Sorting:
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆77Jul 7, 2014Updated 11 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆226Dec 29, 2015Updated 10 years ago
- ☆251Sep 18, 2019Updated 6 years ago
- Easy 802.1Q VLAN Hopping☆80Jul 23, 2024Updated last year
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- locate and attack Lync/Skype for Business☆346Oct 1, 2024Updated last year
- PowerShell Runspace Post Exploitation Toolkit☆1,547Aug 2, 2019Updated 6 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆634Jun 20, 2017Updated 8 years ago
- Egress-Assess is a tool used to test egress data detection capabilities☆693Aug 9, 2023Updated 2 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆285Aug 8, 2021Updated 4 years ago
- A tool to abuse Exchange services☆2,297Jun 10, 2024Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,416Jan 13, 2026Updated last month
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆322Jun 5, 2017Updated 8 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆366Jul 30, 2024Updated last year
- Red Team Tips as posted by @vysecurity on Twitter☆1,067Apr 26, 2020Updated 5 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆328Apr 23, 2023Updated 2 years ago
- Exploit the credentials present in files and memory☆845May 25, 2023Updated 2 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,551Oct 17, 2022Updated 3 years ago
- Search for potential frontable domains☆644Mar 22, 2023Updated 2 years ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,308Nov 22, 2022Updated 3 years ago
- Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain name…☆1,644Jun 6, 2024Updated last year
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,903Nov 19, 2025Updated 2 months ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,111Nov 3, 2017Updated 8 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Mar 7, 2021Updated 4 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,203Aug 7, 2025Updated 6 months ago
- Domain Password Audit Tool for Pentesters☆1,023Dec 24, 2025Updated last month
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Feb 4, 2019Updated 7 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- My musings with PowerShell☆2,705Nov 19, 2021Updated 4 years ago
- LinkedInt: A LinkedIn scraper for reconnaissance during adversary simulation☆487May 23, 2023Updated 2 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Aug 30, 2016Updated 9 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆763Jan 28, 2019Updated 7 years ago
- Burp Suite extension to perform Kerberos authentication☆106Jun 28, 2024Updated last year