shirosaidev / sharesnifferLinks
Network share sniffer and auto-mounter for crawling remote file systems
☆212Updated 3 years ago
Alternatives and similar repositories for sharesniffer
Users that are interested in sharesniffer are comparing it to the libraries listed below
Sorting:
- A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem☆101Updated 6 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆250Updated 5 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆147Updated 6 years ago
- Tool made to automate tasks of pentesting.☆165Updated 5 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆162Updated 5 years ago
- This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team memb…☆214Updated 6 years ago
- A wrapper for Nmap to quickly run network scans☆147Updated 4 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Updated 11 months ago
- Powershell script to exfiltrate large files quickly and securely☆123Updated 3 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449Updated 3 years ago
- SMB Relay Attack Script☆149Updated 6 years ago
- A testing framework for mail security and filtering solutions.☆244Updated last year
- Express security essentials deployment for Linux Servers☆59Updated 4 years ago
- Fileless web browser information extraction☆219Updated 7 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆121Updated last year
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆101Updated 6 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- DomainCheck is designed to assist operators with monitoring changes related to their domain names. This includes negative changes in cate…☆240Updated 6 months ago
- "PRinter Exploitation Toolkit" LAN automation tool☆208Updated 5 years ago
- A script to test an RDP host for sticky keys and utilman backdoor.☆259Updated 8 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆395Updated 5 years ago
- For all your network pentesting needs☆154Updated 11 months ago
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆245Updated 3 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆149Updated 6 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆197Updated 7 years ago
- NebulousAD automated credential auditing tool.☆155Updated 5 years ago
- Distributed Network Vulnerability Scanner☆122Updated 6 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆108Updated 7 years ago
- A Metasploit auto auxiliary script☆104Updated 2 years ago
- vulnerability scanner tool using nmap and nse scripts☆207Updated 10 months ago