philwantsfish / shard
A command line tool to detect shared passwords
☆402Updated 8 years ago
Alternatives and similar repositories for shard:
Users that are interested in shard are comparing it to the libraries listed below
- A webshell framework for penetration testers.☆296Updated 9 months ago
- Various PoCs☆489Updated 4 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆253Updated 7 years ago
- Connection-less Powershell Persistent and Resilient Backdoor☆233Updated 9 years ago
- Open-source pentesting management and automation platform by Salesforce Product Security☆593Updated 2 years ago
- A powerful and extensible wireless drop box☆265Updated 6 years ago
- Automated digital reconnaissance☆194Updated 2 years ago
- Cleans out "open" wireless connections from OSX machine☆153Updated 4 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Updated 8 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆238Updated 7 years ago
- Recon, Subdomain Bruting, Zone Transfers☆228Updated 8 years ago
- Tools for auditing WAFS☆457Updated 4 years ago
- A web front-end for password cracking and analytics☆623Updated 3 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆606Updated 6 years ago
- A Github organization reconnaissance tool.☆216Updated last year
- This repository contains some bettercap transparent proxy example modules.☆282Updated 6 years ago
- ☆423Updated 7 years ago
- Duct Tape Command and Control!☆94Updated 5 years ago
- Automated Linux evil maid attack☆423Updated 9 years ago
- Shodan HQ nmap plugin - passively scan targets☆152Updated 8 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆355Updated 2 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆378Updated 4 years ago