Easy 802.1Q VLAN Hopping
☆390Feb 24, 2016Updated 10 years ago
Alternatives and similar repositories for vlan-hopping---frogger
Users that are interested in vlan-hopping---frogger are comparing it to the libraries listed below
Sorting:
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆77Jul 7, 2014Updated 11 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆226Dec 29, 2015Updated 10 years ago
- ☆252Sep 18, 2019Updated 6 years ago
- Easy 802.1Q VLAN Hopping☆80Jul 23, 2024Updated last year
- HTA encryption tool for RedTeams☆1,422Nov 9, 2022Updated 3 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- locate and attack Lync/Skype for Business☆345Oct 1, 2024Updated last year
- PowerShell Runspace Post Exploitation Toolkit☆1,548Aug 2, 2019Updated 6 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆633Jun 20, 2017Updated 8 years ago
- Egress-Assess is a tool used to test egress data detection capabilities☆697Aug 9, 2023Updated 2 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆284Aug 8, 2021Updated 4 years ago
- A tool to abuse Exchange services☆2,302Jun 10, 2024Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,437Updated this week
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆368Jul 30, 2024Updated last year
- Red Team Tips as posted by @vysecurity on Twitter☆1,069Apr 26, 2020Updated 5 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆328Apr 23, 2023Updated 2 years ago
- Exploit the credentials present in files and memory☆842May 25, 2023Updated 2 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,556Oct 17, 2022Updated 3 years ago
- Search for potential frontable domains☆644Mar 22, 2023Updated 2 years ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,311Nov 22, 2022Updated 3 years ago
- Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain name…☆1,643Jun 6, 2024Updated last year
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,916Nov 19, 2025Updated 3 months ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Mar 7, 2021Updated 4 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,213Aug 7, 2025Updated 7 months ago
- Domain Password Audit Tool for Pentesters☆1,024Dec 24, 2025Updated 2 months ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆124Feb 4, 2019Updated 7 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- My musings with PowerShell☆2,704Nov 19, 2021Updated 4 years ago
- LinkedInt: A LinkedIn scraper for reconnaissance during adversary simulation☆489May 23, 2023Updated 2 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Aug 30, 2016Updated 9 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆760Jan 28, 2019Updated 7 years ago
- Burp Suite extension to perform Kerberos authentication☆106Jun 28, 2024Updated last year