skahwah / wordsmithLinks
The aim of Wordsmith is to assist with creating tailored wordlists. This is mostly based on geolocation.
☆168Updated 7 years ago
Alternatives and similar repositories for wordsmith
Users that are interested in wordsmith are comparing it to the libraries listed below
Sorting:
- 3 tools that work together to simplify reconaissance of Windows File Shares☆168Updated 7 years ago
- ☆241Updated 5 years ago
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆196Updated last year
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆367Updated last year
- Brian's Pentesting and Technical Tips for You☆120Updated last year
- ☆191Updated last year
- ☆105Updated 5 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆77Updated 11 years ago
- Passive internal reconnaissance tool☆72Updated 2 years ago
- LinkedIn reconnaissance tool☆54Updated 3 years ago
- ☆225Updated last year
- Easy 802.1Q VLAN Hopping☆377Updated 9 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆67Updated 3 years ago
- Bash script to parse multiple Nmap (.gnmap) exports into various plain-text formats for easy analysis.☆62Updated 12 years ago
- ☆237Updated 4 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆101Updated 2 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆306Updated 5 years ago
- cracke-dit ("Cracked It") makes it easier to perform regular password audits against Active Directory environments.☆114Updated 5 months ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆397Updated 5 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- SMB Spider is a lightweight python utility for searching SMB/CIFS/Samba file shares. While performing a penetration test, the need to sea…☆134Updated 3 years ago
- Snarf man-in-the-middle / relay suite☆205Updated 8 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Updated 5 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆162Updated 5 years ago
- Rid_enum is a null session RID cycle attack for brute forcing domain controllers.☆287Updated last year
- Frontpage and Sharepoint fingerprinting and attack tool.☆284Updated 3 years ago
- locate and attack Lync/Skype for Business☆340Updated 10 months ago
- Reporting Tips for Penetration Testers☆31Updated 4 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆89Updated 8 years ago