Credentials Checking Framework
☆53Feb 8, 2023Updated 3 years ago
Alternatives and similar repositories for credcheck
Users that are interested in credcheck are comparing it to the libraries listed below
Sorting:
- DNS logging, detection, ...☆15Mar 5, 2022Updated 3 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- Run Powershell remotely from the CLI☆11May 1, 2016Updated 9 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆13Aug 9, 2020Updated 5 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- Collection of content discovery wordlists in one wordlist.☆38Jan 18, 2022Updated 4 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- ☆28Aug 10, 2019Updated 6 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- rapid content discovery tool for recursively querying webservers, handy in pentesting and web application assessments☆250Oct 15, 2019Updated 6 years ago
- Pentest/BugBounty progress control with scanning modules☆281Jul 16, 2020Updated 5 years ago
- Bass grabs you those "extra resolvers" you are missing out on when performing Active DNS enumeration. Add anywhere from 100-6k resolvers …☆147Apr 12, 2024Updated last year
- Post exploitation tool for configuration management servers.☆77Jan 29, 2026Updated last month
- Proof of concept exploit script used to exploit the MS15-034 vulnerability in the Windows HTTP Protocol Stack (HTTP.sys)☆18Mar 27, 2017Updated 8 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will m…☆99Dec 30, 2019Updated 6 years ago
- use at your own risk☆37Nov 23, 2019Updated 6 years ago
- A tool to scan for .DS_Store files on webservers☆35Mar 28, 2021Updated 4 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- ☆14Oct 1, 2021Updated 4 years ago
- A lightweight red teaming platform utilizing concurrent nmap scans to populate a collaborative web server.☆23Feb 22, 2026Updated last week
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- Smart ssrf scanner using different methods like parameter brute forcing in post and get...☆279Feb 11, 2021Updated 5 years ago
- Golang Implant & Post-Exploitation Framework☆60Jun 30, 2023Updated 2 years ago
- ☆23Jul 7, 2020Updated 5 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- Fetch known urls from AlienVault's Open Threat Exchange for given hosts☆63Jul 22, 2019Updated 6 years ago
- A repository of wordlists for enumeration. Will be added to by my tools when they find interesting new entries☆23Jan 21, 2021Updated 5 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆31Aug 16, 2023Updated 2 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆28Oct 19, 2023Updated 2 years ago
- Endpoint monitor tool☆21Sep 16, 2020Updated 5 years ago
- JIRA Secure Attachment Looter☆71Jun 27, 2020Updated 5 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- A rewrite of the popular altDNS subdomain tool by @infosec-au☆12Feb 28, 2019Updated 7 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago