nettitude / yasha
☆18Updated 4 months ago
Alternatives and similar repositories for yasha:
Users that are interested in yasha are comparing it to the libraries listed below
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- FireProx written in Go☆19Updated 10 months ago
- ☆27Updated last year
- A steampipe plugin to query projectdiscovery.io tools.☆26Updated 6 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- self-hosted Azure OSINT tool☆26Updated 5 months ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- ☆17Updated last year
- Active Directory Password Spray Testing Utility in Go☆14Updated 10 months ago
- Nemesis agent for Mythic☆26Updated 5 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆14Updated 2 months ago
- fully async implementation of Dirkjan's ROADTools☆31Updated 11 months ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆33Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆10Updated last year
- PackageSpy is a versatile command-line tool designed to simplify the process of searching for packages on two popular package managers☆22Updated 8 months ago
- ☆16Updated 7 months ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆17Updated 4 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆39Updated 11 months ago
- AWS Testing and Reporting Management Tool☆20Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆14Updated last year
- AutoPoC Generator HoneyPoC☆35Updated 7 months ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Updated last year
- ☆2Updated 2 months ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- Webshell agent in aspx and php☆19Updated 3 months ago