proxycannon / proxycannon-ng
A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWHF 2018 security conference
☆622Updated 2 years ago
Alternatives and similar repositories for proxycannon-ng:
Users that are interested in proxycannon-ng are comparing it to the libraries listed below
- Password spraying using AWS Lambda for IP rotation☆600Updated 2 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆745Updated 6 months ago
- Search for categorized domain☆444Updated 6 years ago
- A poorman's proxycannon and botnet, using docker, ovpn files, tor nodes, and dante socks5 proxies☆139Updated 2 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆573Updated 9 months ago
- gather gather gather☆573Updated 2 weeks ago
- locate and attack Lync/Skype for Business☆336Updated 6 months ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆596Updated 10 months ago
- Search for potential frontable domains☆622Updated 2 years ago
- Python 3.5+ DNS asynchronous brute force utility☆654Updated last year
- linikatz is a tool to attack AD on UNIX☆548Updated last year
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆396Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆594Updated 4 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆759Updated 4 years ago
- an asynchronous target enumeration tool☆243Updated 2 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆305Updated 4 years ago
- Network Pivoting Toolkit☆442Updated last year
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆793Updated 3 months ago
- A mostly-serverless distributed hash cracking platform☆805Updated 11 months ago
- A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)☆736Updated 10 months ago
- socks4 reverse proxy for penetration testing☆588Updated 6 years ago
- WeirdAAL (AWS Attack Library)☆797Updated 2 months ago
- A tool to link a domain with registered organisation names and emails, to other domains.☆841Updated 10 months ago
- External attack surface discovery, enumeration and reconnaissance for massive networks☆444Updated 3 weeks ago
- Active Directory ACL exploitation with BloodHound☆718Updated 3 years ago
- Data exfiltration over DNS request covert channel☆863Updated 11 months ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- Overlord - Red Teaming Infrastructure Automation☆616Updated 10 months ago
- This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit c…☆572Updated 5 years ago
- ☆381Updated 3 weeks ago