blacksheepwall is a hostname reconnaissance tool
☆301Apr 25, 2020Updated 5 years ago
Alternatives and similar repositories for blacksheepwall
Users that are interested in blacksheepwall are comparing it to the libraries listed below
Sorting:
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Aug 29, 2022Updated 3 years ago
- Trivial unixey pentest utilities☆56Feb 23, 2024Updated 2 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Sep 26, 2021Updated 4 years ago
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆383Mar 10, 2020Updated 5 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- A new technique to bypass microsoft's applocker.☆12May 27, 2015Updated 10 years ago
- lair-docker-compose repo☆17Mar 11, 2021Updated 4 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆260Aug 22, 2021Updated 4 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- A utility to perform dictionary attacks against the VoIP SIP Register hash☆14Mar 16, 2016Updated 9 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 12 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- PoC for an adaptive parallelised DNS prober☆109Oct 4, 2022Updated 3 years ago
- Trigger and exploit code for CVE-2014-4113☆42Feb 14, 2016Updated 10 years ago
- ☆252Sep 18, 2019Updated 6 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Mar 7, 2021Updated 4 years ago
- ☆58Jul 16, 2017Updated 8 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆629Oct 16, 2018Updated 7 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Sep 11, 2017Updated 8 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆126Dec 13, 2017Updated 8 years ago
- Extend WSH functionality with Registration-Free COM☆26Feb 23, 2017Updated 9 years ago
- ☆28Apr 4, 2022Updated 3 years ago
- Common Findings Database☆101Jul 25, 2019Updated 6 years ago
- Malicious Macro Generator☆830Apr 17, 2019Updated 6 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆250Nov 24, 2015Updated 10 years ago