Tool orchestrator. Specify targets and run sets of tools against them.
☆19Jun 3, 2016Updated 9 years ago
Alternatives and similar repositories for torc
Users that are interested in torc are comparing it to the libraries listed below
Sorting:
- Store Burp data and collaborate via git☆53Oct 31, 2019Updated 6 years ago
- A collection off SVG for Home Assistant☆13Apr 25, 2025Updated 10 months ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Sep 17, 2015Updated 10 years ago
- ☆23Feb 16, 2016Updated 10 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆106May 30, 2017Updated 8 years ago
- ☆29Apr 20, 2018Updated 7 years ago
- Zone transfers for rwhois☆20Feb 27, 2019Updated 7 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- ☆61Mar 16, 2018Updated 8 years ago
- GUI program to generate windows and SQL audit files for nessus☆14Jun 23, 2017Updated 8 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Jun 11, 2024Updated last year
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49May 16, 2017Updated 8 years ago
- Collection of metasploit modules☆69Mar 1, 2017Updated 9 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Apr 14, 2016Updated 9 years ago
- PowerShell implementations of path-finding algorithms using graph theory☆79Feb 17, 2016Updated 10 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆284Aug 8, 2021Updated 4 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- Reflective/DOM XSS scanner built on casperJS☆81Oct 21, 2014Updated 11 years ago
- ☆12Aug 29, 2025Updated 6 months ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Ansible playbooks to facilitate redteam stuff☆14Aug 2, 2016Updated 9 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Aug 18, 2020Updated 5 years ago
- Check for .net padding oracle patch☆19Oct 4, 2018Updated 7 years ago
- ☆20Jan 18, 2024Updated 2 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- A tool to analyse JMX API security level.☆44Jul 23, 2014Updated 11 years ago
- This script communicates with the Nessus API in an attempt to help with automating scans. Depending on the flag issued with the script, y…☆215Nov 8, 2019Updated 6 years ago
- ☆27Jul 18, 2017Updated 8 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago