automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.
☆72Dec 18, 2019Updated 6 years ago
Alternatives and similar repositories for automato
Users that are interested in automato are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- A PowerShell script for performing a build review of a Windows host☆23Mar 11, 2019Updated 7 years ago
- Neet - Network Enumeration and Exploitation Tool☆168Nov 30, 2016Updated 9 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- API testing tool written with Python☆56Feb 8, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Analyse SQL injection attempts in web server logs☆82Jan 11, 2017Updated 9 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Domain user enumeration tool☆216Nov 2, 2023Updated 2 years ago
- A Report Generation Tool for Security Assessment☆65Dec 31, 2018Updated 7 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225May 8, 2021Updated 4 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- Script to generate malicious debian packages (debain trojans).☆121Apr 24, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆57Sep 22, 2018Updated 7 years ago
- ActionScript ByteCode Disassembler☆16Oct 20, 2015Updated 10 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆141Mar 7, 2018Updated 8 years ago
- ☆12Oct 15, 2024Updated last year
- Poison, reset, spoof, redirect MITM script☆127Aug 5, 2023Updated 2 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Nov 27, 2016Updated 9 years ago
- ☆229May 10, 2018Updated 7 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆123Jul 9, 2019Updated 6 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Pcap (capture file) Analysis Toolkit(v.1)☆109Feb 8, 2017Updated 9 years ago
- AutoBrowser Screenshot☆49Oct 27, 2016Updated 9 years ago
- WEB SERVICE SECURITY ASSESSMENT TOOL☆390Sep 24, 2021Updated 4 years ago
- ☆61Mar 16, 2018Updated 8 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Nov 30, 2017Updated 8 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆176Dec 1, 2022Updated 3 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- transform your payload.exe into one fake word doc (.ppt)☆469Dec 8, 2019Updated 6 years ago
- library and intepreter for penetration testing tools☆30Apr 10, 2016Updated 9 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Jan 3, 2020Updated 6 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- An LDAP based Active Directory user and group enumeration tool☆309Feb 11, 2026Updated last month
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49May 16, 2017Updated 8 years ago