sec-it / ComPPLinks
Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.
☆64Updated 3 years ago
Alternatives and similar repositories for ComPP
Users that are interested in ComPP are comparing it to the libraries listed below
Sorting:
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆69Updated 4 years ago
- Google Meet Phishing Template For Gophish☆47Updated 3 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆66Updated 4 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Updated 4 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- This could have been a bash one-liner but guess what. It's a small Go tool that lists the trending CVEs from cvetrends.com☆107Updated 3 years ago
- Creates and sends fake meeting invite☆73Updated 4 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 3 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 11 months ago
- ☆37Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆53Updated 2 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- ☆58Updated 3 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- Lookup for interesting stuff in SMB shares☆151Updated 2 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆30Updated 3 years ago
- Fast website scraper and wordlist generator☆82Updated 7 months ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆78Updated last year
- Determine the running software version of a remote F5 BIG-IP management interface.☆69Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆59Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- Repository of CVE found by OCD people☆83Updated 6 months ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆69Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago