tyki6 / rawsec_cliLinks
Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.
☆25Updated last month
Alternatives and similar repositories for rawsec_cli
Users that are interested in rawsec_cli are comparing it to the libraries listed below
Sorting:
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Information-Gathering Shell Script☆30Updated 4 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated last year
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆51Updated 2 weeks ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated last month
- ☆29Updated 2 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- ☆14Updated 4 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Updated 4 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Updated 4 years ago
- ☆10Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- Cloud Discovery - brute force public AWS, GCP, Alibaba, and Azure cloud services☆24Updated 4 years ago
- ☆24Updated 6 years ago
- Unique wordlist generator of unique wordlists.☆42Updated last year
- Application for logging HTTP and DNS Requests☆14Updated 4 years ago
- Noob Penetration tester☆11Updated last year
- Automate Auxiliary Module in Metasploit☆20Updated 4 years ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆21Updated last year
- Most common AWS S3 bucket names.☆27Updated 5 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆61Updated 3 years ago