vikingSec / tools
☆23Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for tools
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 3 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆55Updated last month
- Intelligent threat hunter and phishing servers☆46Updated 5 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆28Updated 6 years ago
- ☆34Updated 4 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 2 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆65Updated 5 years ago
- Scripts to help hunt for possible golden/silver TGT tickets☆16Updated 7 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆37Updated last year
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆61Updated 6 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated 4 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- A collection of Nmap NSE scripts that I made.☆27Updated 11 years ago
- Zone transfers for rwhois☆20Updated 5 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 2 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆30Updated 7 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 4 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆52Updated 6 months ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆32Updated 9 months ago
- ☆12Updated 7 years ago
- ☆22Updated 3 years ago