blacksheepwall is a hostname reconnaissance tool
☆300Apr 25, 2020Updated 5 years ago
Alternatives and similar repositories for blacksheepwall
Users that are interested in blacksheepwall are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Aug 29, 2022Updated 3 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆383Mar 10, 2020Updated 6 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- A utility to perform dictionary attacks against the VoIP SIP Register hash☆14Mar 16, 2016Updated 10 years ago
- lair-docker-compose repo☆17Mar 11, 2021Updated 5 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Sep 26, 2021Updated 4 years ago
- TCP port scanning through SYN flood protected networks☆47Nov 28, 2017Updated 8 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- ☆28Apr 4, 2022Updated 3 years ago
- ☆252Sep 18, 2019Updated 6 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- Common Findings Database☆101Jul 25, 2019Updated 6 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Sep 11, 2017Updated 8 years ago
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆260Aug 22, 2021Updated 4 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- A new technique to bypass microsoft's applocker.☆12May 27, 2015Updated 10 years ago
- ☆272Jul 26, 2022Updated 3 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆250Nov 24, 2015Updated 10 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- A library for integrating communication channels with the Cobalt Strike External C2 server☆290Nov 23, 2017Updated 8 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,015Jul 3, 2018Updated 7 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆629Oct 16, 2018Updated 7 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- ☆58Jul 16, 2017Updated 8 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆126Dec 13, 2017Updated 8 years ago
- Malicious Macro Generator☆830Apr 17, 2019Updated 6 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago
- Self contained cross platform DNS recon tool☆187Jul 20, 2017Updated 8 years ago