revers3everything / hackthelanLinks
A tool designed for penetration testers to perform attacks on LAN and WLAN networks, including network discovery, exploitation, and NAC bypass techniques to gain unauthorized access.
☆44Updated 6 months ago
Alternatives and similar repositories for hackthelan
Users that are interested in hackthelan are comparing it to the libraries listed below
Sorting:
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆52Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆18Updated last year
- Mass bruteforce authentication of common services with common credentials.☆53Updated 2 years ago
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- A fast Go-based tool to uncover sensitive information in JavaScript☆37Updated 7 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Updated 2 years ago
- Web Path Finder☆60Updated 2 years ago
- 「🧱」Test a list of payloads and see if you can bypass it☆62Updated 3 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆29Updated 2 years ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated 2 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆57Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Updated last year
- ☆27Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated 2 years ago
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've …☆61Updated 7 months ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆47Updated last year
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆131Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆40Updated 2 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Updated 2 years ago
- DroidSniper - Misconfigured Android Debug Bridge Scanner☆13Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- Magicspoofing it's a python script that checks & test SPF/DMARC DNS records an tries to spoof a domain with a open relay mail system.☆53Updated 10 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆57Updated last year