This tool provides an interactive TUI for reviewing Nessus finding exports, running security tools (nmap, netexec, metasploit), and tracking progress.
☆63Feb 5, 2026Updated 3 weeks ago
Alternatives and similar repositories for cerno
Users that are interested in cerno are comparing it to the libraries listed below
Sorting:
- CVE-2020-14882 Weblogic-Exp☆17Oct 29, 2020Updated 5 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- This is a proof-of-work for abusing "fsmonitor" against IDE.☆42Nov 22, 2025Updated 3 months ago
- Universal firewall configuration generator.☆19Jan 24, 2019Updated 7 years ago
- ☆19Mar 23, 2021Updated 4 years ago
- Powershell Keepass Brute Force Tool☆28Jul 22, 2019Updated 6 years ago
- A CLI tool for managing DigitalOcean droplets with automated setup, SSH configuration, and lifecycle management.☆73Feb 25, 2026Updated last week
- Conditional Access Reporting☆29Apr 4, 2025Updated 11 months ago
- Simple bash script to spray known credentials against multiple services with netexec☆69Jan 16, 2026Updated last month
- ☆32Oct 21, 2023Updated 2 years ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆85Feb 9, 2026Updated 3 weeks ago
- A wrapper around tools used for subdomain enumeration, to automate the workflow, on a given domain, written in bash.☆79Aug 2, 2022Updated 3 years ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆36Nov 27, 2023Updated 2 years ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Mar 2, 2019Updated 7 years ago
- Tool to extract username and password of current user from PanGPA in plaintext☆89Dec 23, 2024Updated last year
- The ultimate phishing tool with 38 websites available!☆16Nov 7, 2024Updated last year
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Version 2 of the Rhythm Randomizer project☆13Jan 6, 2023Updated 3 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Remove NotebookLM watermarks from slides. Local processing, no upload needed.☆35Jan 15, 2026Updated last month
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Python client for McAfee ePolicy Orchestrator☆15Mar 12, 2021Updated 4 years ago
- A simple Dockerfile to build an image starting from the latest official one of Kali Linux and including some useful tools.☆41Oct 17, 2022Updated 3 years ago
- Before using Emagnet, please remember that with great power comes great responsibility.☆22Mar 30, 2025Updated 11 months ago
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- ☆19Jul 14, 2025Updated 7 months ago
- ☆15Sep 4, 2024Updated last year
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- ☆11Oct 10, 2020Updated 5 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- 四万多条规则,不含广告过滤,避免误杀,内含PAYPAL,TIKTOK,TELEGRAM,YOUTUBE,STREAMING (包含迪士尼奈飞亚马逊等流媒体),WEIBO分组规则,需要自己手动在小火箭里面-全局路由-分组-添加分组,需要以上哪个分组添加哪个,没添加的默认走PR…☆13Feb 4, 2023Updated 3 years ago
- A simple Python script to do quick, targeted recon of a given domain.☆70Apr 17, 2025Updated 10 months ago
- ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an int…☆113Updated this week
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- ☆12Aug 22, 2017Updated 8 years ago
- Add tracking hidden image to Word documents☆16Aug 30, 2017Updated 8 years ago
- DEFCON-RUSSIA WEB☆12Mar 30, 2021Updated 4 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago