tyki6 / rawsec_cliLinks
Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.
☆26Updated 3 weeks ago
Alternatives and similar repositories for rawsec_cli
Users that are interested in rawsec_cli are comparing it to the libraries listed below
Sorting:
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆43Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Anonymize your hashcat formatted files for online cracking☆31Updated 10 months ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Passive reconnaissance/enumeration of interesting targets by watching for SSL certificates being issued☆68Updated 2 years ago
- REST API backend for Reconmap☆47Updated this week
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 9 months ago
- ☆20Updated 4 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆26Updated 5 years ago
- Find the remote website version based on a git repository☆125Updated 4 years ago
- ☆29Updated 2 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Updated 4 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆62Updated 3 years ago
- Various scripts and codes☆84Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated 2 years ago
- Information-Gathering Shell Script☆30Updated 4 years ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 3 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- Fast and intuitive manager for multiple reverse shells☆86Updated 8 months ago
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated 4 months ago
- Penetration Testing with Kali Linux☆22Updated 5 years ago
- ☆38Updated 4 years ago