toolswatch / DPE
DPE - Default Password Enumeration
☆34Updated 11 years ago
Alternatives and similar repositories for DPE:
Users that are interested in DPE are comparing it to the libraries listed below
- Open Standard Vulnerability & Compliance Scanner☆43Updated 9 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- Search bing with python☆12Updated 10 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Updated 12 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- Phishing Toolkit☆20Updated 7 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- ☆18Updated last year
- Passive recon / OSINT automation script☆40Updated 6 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Web application that lets you test if your domain is vulnerable to email spoofing☆35Updated 6 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- ☆28Updated 9 years ago
- Python Remote Administration Tool☆13Updated 8 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 8 months ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 8 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- recon-ng Maltego local transform pack☆40Updated 11 years ago