scriptjunkie / puttykeys
Library to convert Putty private keys (ppk files) to OpenSSH format
☆13Updated 3 years ago
Related projects: ⓘ
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Updated 2 months ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- Extract, defang, resolve names and IPs from text☆22Updated 8 months ago
- ☆11Updated this week
- ☆19Updated 3 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆18Updated 8 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 11 years ago
- ☆18Updated 12 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆30Updated 6 years ago
- Awesome little automater☆17Updated 11 years ago
- runtime code injector for Linux☆27Updated 13 years ago
- ☆15Updated 7 years ago
- Nano meterpreter shell based on TinyMet☆27Updated 8 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 12 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆15Updated 10 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 9 years ago
- Env Scraper for Linux Post Exploitation☆9Updated 7 years ago
- An application for distributing oclHashcat tasks.☆21Updated 8 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆16Updated 8 years ago
- Discover potential timestamps within the Windows Registry