sensepost / password-toolsLinks
Service desk password tools.
☆16Updated 8 years ago
Alternatives and similar repositories for password-tools
Users that are interested in password-tools are comparing it to the libraries listed below
Sorting:
- Casper is a tiny system tray application that can be used to view the invisible windows on your desktop.☆12Updated 8 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- Various pentest scripts☆13Updated 11 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- firewall port testing tool☆12Updated 6 years ago
- Search bing with python☆12Updated 10 years ago
- Testing page for checking the privileges that a browser gives to the file:// origin☆10Updated 9 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆11Updated 10 years ago
- Scanner for document roots/URLs.☆14Updated 13 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20Updated 9 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 4 years ago
- Recon tool using Yatedo and Pipl☆9Updated 10 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Awesome little automater☆17Updated 12 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Fingerprint server side technology☆28Updated 11 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Universal stack-based buffer overfow exploitation tool☆23Updated 11 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- NMAP NSE that enumerates VNC authentication types☆17Updated 14 years ago
- Ruby Oracle Security Scanner☆16Updated 12 years ago