ucki / multipass
☆14Updated 6 years ago
Alternatives and similar repositories for multipass:
Users that are interested in multipass are comparing it to the libraries listed below
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- My pentest cheat sheet☆15Updated 7 years ago
- A scripted library of hacking techniques.☆18Updated 6 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Plugin for keepnote to import a XML nmap file☆26Updated 8 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆25Updated 8 years ago
- The initial conversation slides and menu of scenarios☆38Updated 3 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Automated enumeration☆30Updated 3 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- WhiteBox CMS analysis☆69Updated last year
- ☆51Updated 8 years ago
- ☆12Updated 8 years ago
- ☆25Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- ☆26Updated 8 years ago
- Ransack Post Exploitation Tool☆16Updated 8 years ago
- Basic Auth Phish page☆25Updated 7 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆11Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆53Updated 8 years ago
- Metasploit Framework☆26Updated 7 years ago
- Hacking challenges☆32Updated 7 years ago
- Find a useable IP address to use☆29Updated 10 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Updated 5 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- Script to automate, manage, and multithread Nikto scans.☆59Updated 5 years ago