vonahisec / leprechaun
This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.
☆244Updated 3 years ago
Alternatives and similar repositories for leprechaun:
Users that are interested in leprechaun are comparing it to the libraries listed below
- Feed the tool a .nessus file and it will automatically get you MSF shell☆234Updated 2 years ago
- nray distributed port scanner☆151Updated last year
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- an asynchronous target enumeration tool☆242Updated 2 years ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆301Updated 2 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆384Updated 6 years ago
- A wrapper for Nmap to quickly run network scans☆146Updated 4 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆306Updated 7 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆310Updated 4 years ago
- a CLI for ephemeral penetration testing☆8Updated 5 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Updated 4 years ago
- Easy files and payloads delivery over DNS☆420Updated 9 months ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆248Updated 5 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆304Updated 4 years ago
- A code demonstrating CVE-2018-0886☆263Updated 4 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆445Updated 2 years ago
- Reverse Shell Cheat Sheet TooL☆291Updated 4 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆245Updated 7 months ago
- A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.☆168Updated last year
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆392Updated 4 years ago
- Network Pivoting Toolkit☆439Updated last year
- A WebSocket C2 Tool☆389Updated 7 years ago
- This project is just a dumping ground for random scripts I've developed.☆137Updated 5 months ago
- PowerShell Empire Web Interface☆329Updated last year
- Automated Tactics Techniques & Procedures☆252Updated last year
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆206Updated 7 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆202Updated 11 months ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆168Updated 7 years ago
- Remote Recon and Collection☆448Updated 7 years ago