polo-sec / armoryLinks
A curated repository of the tools, scripts, resources and programs I use regularly for CTF, BB or other security work.
☆15Updated 4 years ago
Alternatives and similar repositories for armory
Users that are interested in armory are comparing it to the libraries listed below
Sorting:
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- autocrack adds queue support for hashcat cracking.☆40Updated 2 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Empower your enumeration during OSCP☆36Updated 7 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- ☆24Updated 6 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- Various scripts and codes☆84Updated 4 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 5 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆12Updated 4 years ago
- Information-Gathering Shell Script☆29Updated 5 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 3 years ago
- Post-exploitation tool☆26Updated 4 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Updated 5 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- Import Nmap scans to Cherrytree☆36Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Updated 4 years ago
- Penetration Testing with Kali Linux☆22Updated 6 years ago
- Collaborative pentest tool with highly customizable tools☆73Updated 4 years ago
- Commands used in Windows penetration tests☆55Updated 2 months ago
- Custom pentesting tools☆26Updated 5 years ago
- wordlists for password cracking☆28Updated 3 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 4 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆24Updated 8 months ago
- recon-ng modules for Censys☆37Updated 2 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Updated 6 years ago
- Automated compromise detection of the world's most popular packages☆17Updated 2 years ago