sensepost / routopsy
Routopsy - Hacking Routers with Routers
☆168Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for routopsy
- A collection of data exfiltration scripts for Red Team assessments.☆96Updated 4 years ago
- ☆54Updated 4 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 4 years ago
- Stealthy data exfiltration via IPv6 covert channel☆99Updated 5 years ago
- Automated 802.1x Bypass☆84Updated 4 years ago
- Collection of scripts & fingerprinting tricks for Shodan.io☆246Updated 4 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Updated 5 years ago
- Passive internal reconnaissance tool☆67Updated 2 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆117Updated 4 years ago
- Parse .nessus file(s) and shows output in interactive UI☆146Updated 7 months ago
- Disposable and resilient red team infrastructure with Terraform☆253Updated 5 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆197Updated 5 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆126Updated 3 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆57Updated 2 years ago
- Pivoting Frontend for Pre-Seeded Password Databases☆118Updated 2 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 3 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆214Updated 3 years ago
- ☆147Updated last year
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆245Updated 5 months ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 3 years ago
- useful pentest note☆66Updated 2 months ago
- SNIcat☆125Updated 3 years ago
- An advanced graphical search engine for Exploit-DB☆116Updated 5 months ago
- Automate Metasploit scanning and exploitation☆112Updated last month
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆62Updated 2 years ago
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆242Updated last year
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆245Updated last year
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆201Updated 4 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆309Updated 3 years ago