pasv / Satori
Hunting system admins with Powershell/WMI
☆13Updated 10 years ago
Alternatives and similar repositories for Satori:
Users that are interested in Satori are comparing it to the libraries listed below
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- ☆17Updated 10 years ago
- A framework for creating modular bots/backdoors☆21Updated 9 years ago
- Custom scripts released for BSidesDC 2016☆14Updated 8 years ago
- Awesome little automater☆17Updated 12 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- ☆11Updated 9 years ago
- Scripts to query local admins quickly☆9Updated 9 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- Lair Framework dockerized.☆38Updated 4 years ago
- Why hunt when you can seine?☆21Updated 9 years ago
- Next Generation of White Chapel☆21Updated 10 years ago
- ☆19Updated 7 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Updated 8 years ago
- Data exfiltration PoC scripts☆24Updated 9 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆18Updated 9 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- Tools to enumerate Windows Firewall Hook Drivers on Windows 2000, XP and 2003☆20Updated 10 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 8 years ago
- Scripts for automating actions in Cobalt Strike☆11Updated 8 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Mainframe bruter and screen automation utility.☆19Updated 3 years ago
- Basic file metadata gathering script☆21Updated last week
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Updated 11 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago