rmikehodges / hideNsneakLinks
a CLI for ephemeral penetration testing
☆13Updated 5 years ago
Alternatives and similar repositories for hideNsneak
Users that are interested in hideNsneak are comparing it to the libraries listed below
Sorting:
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆306Updated 4 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆386Updated 6 years ago
- locate and attack Lync/Skype for Business☆338Updated 8 months ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Updated 4 years ago
- A framework for stealthy domain reconnaissance☆303Updated 3 years ago
- an asynchronous target enumeration tool☆244Updated 2 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆395Updated 5 years ago
- For all your network pentesting needs☆154Updated 11 months ago
- Bloodhound Attack Path Automation in CobaltStrike☆318Updated 5 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆469Updated 5 years ago
- Fast subdomains enumeration tool for penetration testers☆117Updated 6 years ago
- Linux post exploitation enumeration and exploit checking tools☆180Updated 5 years ago
- Remote Recon and Collection☆453Updated 7 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449Updated 3 years ago
- A collection of useful Serverless functions I use when pentesting☆387Updated 2 years ago
- Windows Pentest Scripts☆231Updated 7 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Updated last year
- Search for categorized domain☆446Updated 6 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- DNS Rebinding Exploitation Framework☆490Updated 4 years ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆308Updated 2 years ago
- This repo contains my custom scripts for Penetration Testing and Red Team Assessments. I will keep on updating this repo as and when I ge…☆352Updated 6 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆209Updated 7 years ago
- Domain user enumeration tool☆215Updated last year
- Network Pivoting Toolkit☆448Updated last year
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆306Updated 7 years ago