thevickypedia / NetSec
Python module to analyze devices connected to the router and alert accordingly.
☆18Updated last year
Related projects: ⓘ
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆37Updated last year
- Fast Path Traversal exploitation tool☆21Updated 5 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆43Updated 6 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).☆106Updated 7 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆24Updated 11 months ago
- ☆24Updated this week
- quick and dirty proof-of-concept to hide shells in images☆48Updated 2 months ago
- Web Path Finder☆57Updated 9 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated 10 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆48Updated 6 months ago
- Mass bruteforce authentication of network protocols☆42Updated 9 months ago
- This is an AD pentest tools collection☆52Updated 2 months ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆75Updated 9 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆46Updated 6 months ago
- A small executable to trick a user to authenticate using code matching MFA☆67Updated 11 months ago
- Brute forcing login pages with SQL Injection queries with cURL☆17Updated last year
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆39Updated 7 months ago
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆40Updated 9 months ago
- Automate Scoping, OSINT and Recon assessments.☆89Updated 2 weeks ago
- Recon scripts for Red Team and Web blackbox auditing☆29Updated 7 months ago
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated 9 months ago
- ☆26Updated last year
- Tools used for Pentesting☆22Updated last year
- ☆19Updated this week
- Capture screenshots of onion services on an onion service.☆50Updated 3 months ago
- Discovering Typo Squatting on your domains!☆58Updated last month
- ☆56Updated 4 months ago
- Resources, repos and scripts for pentesters and bug bounty.☆55Updated last week
- Powershell tools used for Red Team / Pentesting.☆73Updated 8 months ago