webpwnized / byepass
ByePass automates a large number of password cracking tasks using optimized dictionaries and mangling rules
☆71Updated 3 years ago
Related projects: ⓘ
- SSH User Enumeration Script in Python Using The Timing Attack☆91Updated 8 years ago
- Airodump-ng WiFi Scan Visualizer☆54Updated 6 years ago
- Penetration Testing/Security Cheatsheets☆55Updated 8 years ago
- A shell script that automatically performs a series of *NIX enumeration tasks.☆39Updated 3 years ago
- Linux setup tool for Kali Linux☆76Updated 6 years ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆85Updated 6 months ago
- Just a collection of pentest stuffs☆96Updated 4 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆64Updated 5 years ago
- ☆35Updated 8 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆20Updated 2 years ago
- ☆66Updated this week
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆73Updated 10 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆143Updated 6 years ago
- Reconnaissance scripts for penetration testing☆55Updated 9 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆35Updated 5 years ago
- ☆60Updated this week
- "PRinter Exploitation Toolkit" LAN automation tool☆196Updated 4 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Updated 3 years ago
- PortForce - A custom port Brute Forcing Tool for CTF's & Pentests☆23Updated 7 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆47Updated 8 years ago
- A collection of scripts that help with different aspects of password cracking, such as wordlist generation, mask analysis, and positional…☆102Updated 4 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆82Updated 6 years ago
- Wiki to collect Red Team infrastructure hardening resources☆18Updated 6 years ago
- Repo contains a list of random scripts that I use while testing out random things.☆47Updated 5 years ago
- scripts for pentesting☆87Updated 6 years ago
- Enumerate a target Based off of Nmap Results☆77Updated 10 months ago
- Random collection of exploit code, tools, scripts, etc.☆24Updated 9 years ago
- Use Tor for anonymous scanning with nmap☆77Updated 9 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆91Updated 4 years ago
- Search drives for documents containing passwords☆61Updated 10 years ago