sensepost / net-credsLinks
Sniffs sensitive data from interface or pcap
☆14Updated 7 years ago
Alternatives and similar repositories for net-creds
Users that are interested in net-creds are comparing it to the libraries listed below
Sorting:
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- Framework for Man-In-The-Middle attacks☆14Updated 7 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- ☆33Updated 10 months ago
- Red Team Tool Kit☆16Updated 6 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆23Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Updated 5 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Miscellaneous for various things☆21Updated last year
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 4 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Updated 7 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆13Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Updated 7 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆12Updated 5 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆23Updated 7 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆66Updated 5 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆22Updated 11 years ago
- Auto Web Vulnerability Scanning Framework☆10Updated 9 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- Wireless Pentesting Device☆24Updated 5 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 6 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Updated 3 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆26Updated 8 years ago
- buffer overflow examples☆22Updated 7 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 7 years ago
- Simple Karma Attack☆69Updated 5 years ago