sensepost / birpLinks
Big Iron Recon & Pwnage
☆124Updated 4 years ago
Alternatives and similar repositories for birp
Users that are interested in birp are comparing it to the libraries listed below
Sorting:
- Easy 802.1Q VLAN Hopping☆80Updated last year
- Mainframe security auditing and scripts☆140Updated 7 years ago
- Enterprise WPA Wireless Tool Suite☆87Updated 3 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 11 years ago
- ☆57Updated 5 years ago
- CICSpwn is a tool to pentest a CICS Transaction servers on z/OS.☆86Updated 5 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆77Updated 11 years ago
- Privilege escalation tools on Mainframe☆83Updated 6 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- Common Findings Database☆101Updated 6 years ago
- hack400tool☆110Updated 8 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 9 years ago
- Bash script to parse multiple Nmap (.gnmap) exports into various plain-text formats for easy analysis.☆66Updated 12 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆170Updated 7 years ago
- Snarf man-in-the-middle / relay suite☆206Updated 9 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- SMB Spider is a lightweight python utility for searching SMB/CIFS/Samba file shares. While performing a penetration test, the need to sea…☆135Updated 4 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 7 years ago
- Mainframe bruter and screen automation utility.☆43Updated 11 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- ☆28Updated 3 years ago
- This is a simple parser for/decrypter for Impacket's esentutl.py utility. It assists with decrypting hashes and hash histories from ntds.…☆70Updated 9 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- unix wildcard attacks☆137Updated 7 years ago
- tools for analyzing strings from password lists☆58Updated 3 years ago
- async mass DNS resolver☆85Updated 2 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 6 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆71Updated 8 years ago
- ☆104Updated 6 years ago
- Burp Suite extension to perform Kerberos authentication☆106Updated last year