nettitude / yasha
☆18Updated last month
Related projects ⓘ
Alternatives and complementary repositories for yasha
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- self-hosted Azure OSINT tool☆23Updated 2 months ago
- ☆28Updated last year
- FireProx written in Go☆17Updated 7 months ago
- ☆17Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- Active Directory Password Spray Testing Utility in Go☆14Updated 8 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆10Updated last year
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆19Updated 3 years ago
- A steampipe plugin to query projectdiscovery.io tools.☆26Updated 4 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆28Updated 7 months ago
- Ansible role that Installs Mythic☆14Updated 5 months ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆33Updated 9 months ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆19Updated 7 months ago
- Nemesis agent for Mythic☆25Updated 2 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆27Updated last year
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆16Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆50Updated 7 months ago
- ☆50Updated 7 months ago
- exfiltration/infiltration toolkit☆23Updated 11 months ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Updated 2 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆14Updated last year
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- A user enumeration tool for Slack.☆24Updated 5 months ago