ucki / multipassLinks
☆14Updated 7 years ago
Alternatives and similar repositories for multipass
Users that are interested in multipass are comparing it to the libraries listed below
Sorting:
- My pentest cheat sheet☆15Updated 8 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- Automated enumeration☆30Updated 4 years ago
- A scripted library of hacking techniques.☆18Updated 7 years ago
- ☆61Updated 7 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 9 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆26Updated 8 years ago
- Hacking challenges☆31Updated 8 years ago
- The initial conversation slides and menu of scenarios☆38Updated 4 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 9 years ago
- A collection of useful scripts for penetration testers☆83Updated 13 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- Plugin for keepnote to import a XML nmap file☆27Updated 9 years ago
- Find a useable IP address to use☆30Updated 11 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- Reconnaissance scripts for penetration testing☆58Updated 10 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Updated last year
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- ☆51Updated 9 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 8 years ago
- Nmap enumeration and script scan automation script☆38Updated 2 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- Pentesting Tools☆22Updated 2 months ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 2 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 6 years ago