s0i37 / netLinks
Useful collection of scapy-scripts and more
☆31Updated last year
Alternatives and similar repositories for net
Users that are interested in net are comparing it to the libraries listed below
Sorting:
- exfiltration/infiltration toolkit☆48Updated 11 months ago
- 1C RAS Offensive Security Tool☆27Updated 2 years ago
- Automate converting webshells into reverse shells.☆70Updated 2 weeks ago
- linikatz is a tool to attack AD on UNIX☆149Updated last year
- ☆92Updated 5 years ago
- Finding secrets in various (non-text) popular files.☆49Updated 3 months ago
- C2 Automation using Linode☆85Updated 3 years ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆53Updated last month
- About PIVOting☆12Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆146Updated last year
- ☆57Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆24Updated 8 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆116Updated 3 months ago
- My Favorite Offensive Security Scripts☆77Updated 5 months ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆112Updated 2 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 8 months ago
- Easy red team phishing with Puppeteer☆132Updated 2 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆133Updated last year
- Creates and sends fake meeting invite☆71Updated 4 years ago
- Detect common NFS server misconfigurations☆67Updated 4 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated 11 months ago
- POC for DLL Proxying / Hijacking☆62Updated 4 months ago
- Rewriting SIET to python3☆53Updated 11 months ago
- Creating a Malicious Macro using MS Word☆24Updated 3 years ago
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆25Updated 5 months ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago