sensepost / routopsy
Routopsy - Hacking Routers with Routers
☆171Updated 3 years ago
Alternatives and similar repositories for routopsy:
Users that are interested in routopsy are comparing it to the libraries listed below
- Automated 802.1x Bypass☆85Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 4 years ago
- ☆149Updated last year
- SNIcat☆126Updated 3 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆202Updated 4 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆248Updated 5 years ago
- Lure - User Recon Automation for GoPhish☆161Updated last year
- ☆280Updated 7 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆59Updated 2 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- ☆234Updated 4 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆245Updated 7 months ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆287Updated 3 months ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆215Updated 3 years ago
- Stealthy data exfiltration via IPv6 covert channel☆104Updated 5 years ago
- ☆54Updated 4 years ago
- Simple Python tool to decrypt the "enc_GroupPwd" variable in PCF files (and type 5/7 passwords).☆102Updated 5 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆127Updated 3 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆312Updated 3 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆146Updated 6 years ago
- An advanced graphical search engine for Exploit-DB☆117Updated 8 months ago
- Collection of scripts & fingerprinting tricks for Shodan.io☆251Updated 4 years ago
- A Linux enumeration script for Hack The Box☆187Updated 5 years ago
- Fully-featured spear-phishing toolkit - web front-end☆49Updated 2 weeks ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆161Updated 5 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 4 years ago
- Responsive Command and Control System☆102Updated 2 years ago
- Network Pivoting Toolkit☆438Updated last year