tomsteele / cookiescanLinks
TCP port scanning through SYN flood protected networks
☆46Updated 7 years ago
Alternatives and similar repositories for cookiescan
Users that are interested in cookiescan are comparing it to the libraries listed below
Sorting:
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆62Updated 3 years ago
- Trivial unixey pentest utilities☆57Updated last year
- Password spraying on sites that require 2+ page loads and dynamic nonces☆32Updated 6 years ago
- Conveigh is a Windows PowerShell LLMNR/NBNS spoofer detection tool☆97Updated 9 years ago
- ☆99Updated 6 years ago
- A Django application to help red team operators manage a library of domain names☆166Updated 2 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆21Updated 8 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆182Updated 3 years ago
- A HTA shell to assist with breakout assessments.☆112Updated 3 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆67Updated 7 years ago
- A simple, extensible C&C beaconing system.☆101Updated 7 years ago
- Responsive Command and Control System☆103Updated 2 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆37Updated 7 years ago
- ☆139Updated 5 years ago
- Samba, NFS shares spider and grepper☆71Updated 7 years ago
- CCDC Red Team PWNboard☆77Updated 7 years ago
- Liniaal - A communication extension to Ruler☆97Updated 7 years ago
- Bash script to parse multiple Nmap (.gnmap) exports into various plain-text formats for easy analysis.☆63Updated 12 years ago
- DeepSea Phishing Gear☆123Updated 5 years ago
- Windows Share Enumerator☆129Updated 6 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- Reconnaissance tool for Microsoft Office 365☆69Updated 6 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆68Updated 3 years ago
- A Python tool for ingesting HTML and producing HTML source suitable for phishing campaigns.☆59Updated 3 weeks ago
- A command line tool for creating malicious outlook rules☆165Updated 6 years ago
- Post exploitation tool for configuration management servers.☆77Updated 2 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Updated 5 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆110Updated 9 months ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Updated last year
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆46Updated 7 years ago