sensepost / routopsy
Routopsy - Hacking Routers with Routers
☆168Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for routopsy
- ☆229Updated 4 years ago
- SNIcat☆125Updated 3 years ago
- ☆54Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆95Updated 4 years ago
- Stealthy data exfiltration via IPv6 covert channel☆99Updated 5 years ago
- Automated 802.1x Bypass☆84Updated 4 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆244Updated 4 months ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆141Updated last year
- HoneyCreds network credential injection to detect responder and other network poisoners.☆214Updated 3 years ago
- automated password spraying tool☆147Updated 3 years ago
- An advanced graphical search engine for Exploit-DB☆116Updated 5 months ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆201Updated 4 years ago
- DeepSea Phishing Gear☆117Updated 4 years ago
- Lure - User Recon Automation for GoPhish☆158Updated last year
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 2 years ago
- DomainCheck is designed to assist operators with monitoring changes related to their domain names. This includes negative changes in cate…☆231Updated 5 years ago
- ☆147Updated last year
- Disposable and resilient red team infrastructure with Terraform☆252Updated 5 years ago
- ☆332Updated last year
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆61Updated 2 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆66Updated 9 months ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆161Updated 5 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆126Updated 3 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆309Updated 3 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆117Updated 4 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 4 years ago
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆240Updated last year
- Network Pivoting Toolkit☆435Updated last year
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆329Updated 5 years ago
- ☆280Updated 6 years ago