hardCIDR is a Linux Bash script, but also functions under macOS. Your mileage may vary on other distros. The script with no specified options will query ARIN and a pool of BGP route servers. The route server is selected at random at runtime.
☆382Feb 4, 2022Updated 4 years ago
Alternatives and similar repositories for hardcidr
Users that are interested in hardcidr are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆55Jun 15, 2018Updated 7 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Feb 7, 2014Updated 12 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆64Jun 26, 2018Updated 7 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆24Oct 8, 2014Updated 11 years ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆503Nov 17, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆36Nov 10, 2016Updated 9 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- PoC code from blog☆17Mar 10, 2020Updated 6 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 7 years ago
- tool that generates bypasses for open redirects☆51Apr 18, 2022Updated 4 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆145Aug 9, 2015Updated 10 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Dec 17, 2021Updated 4 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆170Jun 8, 2017Updated 8 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Search for potential frontable domains☆646Mar 22, 2023Updated 3 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆375Jul 30, 2024Updated last year
- PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and…☆582Jul 3, 2025Updated 10 months ago
- Search exposed EBS volumes for secrets☆304Apr 24, 2023Updated 3 years ago
- A tool to abuse Exchange services☆2,304Jun 10, 2024Updated last year
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆763Sep 23, 2024Updated last year
- A WebDAV PROPFIND C2 tool☆120Aug 27, 2019Updated 6 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆180Oct 21, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆146Oct 31, 2023Updated 2 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Jul 29, 2021Updated 4 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆51Apr 3, 2016Updated 10 years ago
- The aim of Wordsmith is to assist with creating tailored wordlists. This is mostly based on geolocation.☆170May 3, 2018Updated 8 years ago
- ☆128May 22, 2023Updated 3 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,964Nov 19, 2025Updated 6 months ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,602Feb 5, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Microsoft External Attack Tool☆178Dec 8, 2022Updated 3 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆443Aug 18, 2023Updated 2 years ago
- Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses.☆735Jan 16, 2024Updated 2 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,281Apr 23, 2026Updated last month
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆636Jun 20, 2017Updated 8 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,236Aug 7, 2025Updated 9 months ago
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆131Jan 28, 2018Updated 8 years ago