omarrajab / NoJlede
The Advanced Automated Pentesting And Forensics Tool
☆26Updated last year
Alternatives and similar repositories for NoJlede
Users that are interested in NoJlede are comparing it to the libraries listed below
Sorting:
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- ☆33Updated 3 months ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 3 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- A Simple Web Shell used for Remote Code Execution.☆11Updated 5 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated last year
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated 5 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆26Updated 7 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆12Updated 3 years ago
- An automated e-mail OSINT tool☆21Updated 3 years ago
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆18Updated 4 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 5 years ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- ☆12Updated 4 years ago
- A collection of tools for managing and automating vulnerability management.☆13Updated 3 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Burp suite Certificate modification tool☆18Updated 2 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Updated 5 years ago
- Hashes of infamous malware☆26Updated last year
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago