sathish09 / zsh_plugins
zsh plugin for metasploit framework
☆14Updated 7 years ago
Alternatives and similar repositories for zsh_plugins:
Users that are interested in zsh_plugins are comparing it to the libraries listed below
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- ☆61Updated 7 years ago
- A collection of useful scripts for penetration testers☆82Updated 12 years ago
- Cowrie Honeypot Obscurer☆17Updated 4 years ago
- Puny Domain Name Check☆37Updated 5 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- CTF website frontend for SecGen☆21Updated 7 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- Plugins for the Serpico Project☆23Updated 6 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆25Updated 8 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Nmap enumeration and script scan automation script☆38Updated 2 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 5 years ago
- ☆8Updated 7 years ago
- Automated enumeration☆30Updated 4 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated 10 months ago
- ☆14Updated 6 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- Because I can't find scripts to do this anywhere else...☆25Updated 8 years ago
- #HackingTogether☆13Updated 8 years ago
- Git Web Hook Tunnel for C2☆28Updated last year
- Auto detect and brute force SSH, SMB, and MSSQL logins☆15Updated 9 years ago
- ☆25Updated 8 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆61Updated 7 years ago
- Find a useable IP address to use☆29Updated 10 years ago
- Post-exploitation scripts for OS X persistence and privesc☆72Updated 8 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago