sensepost / routopsyLinks
Routopsy - Hacking Routers with Routers
☆174Updated 3 years ago
Alternatives and similar repositories for routopsy
Users that are interested in routopsy are comparing it to the libraries listed below
Sorting:
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Updated 11 months ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- WireBug is a toolset for Voice-over-IP penetration testing☆171Updated 3 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆128Updated 4 years ago
- SNIcat☆126Updated 3 years ago
- A Linux enumeration script for Hack The Box☆189Updated 5 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆204Updated 4 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 3 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆145Updated 3 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆208Updated 5 years ago
- Automated 802.1x Bypass☆84Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆59Updated 3 years ago
- Automatically exported from code.google.com/p/nipper-ng☆70Updated 2 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆222Updated 4 years ago
- ☆150Updated last year
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 5 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆162Updated 5 years ago
- Lure - User Recon Automation for GoPhish☆163Updated last year
- useful pentest note☆66Updated 2 months ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- ☆334Updated 2 years ago
- Packet communication investigator☆92Updated 2 years ago
- Network Pivoting Toolkit☆447Updated last year
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆121Updated 4 years ago
- Collection of scripts & fingerprinting tricks for Shodan.io☆251Updated 4 years ago