yozgarcia / el_segmentadorLinks
Tool to automate corporate network segmentation test
☆20Updated 4 years ago
Alternatives and similar repositories for el_segmentador
Users that are interested in el_segmentador are comparing it to the libraries listed below
Sorting:
- ☆38Updated 4 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Updated 4 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- You can check below blog post on attacks related to azure storage.☆13Updated 4 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆43Updated 5 months ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- ☆24Updated 6 years ago
- ☆26Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- Virtual Security Operations Center☆51Updated last year
- S3 bucket enumerator☆30Updated 6 years ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- ☆54Updated 4 years ago
- Mindmaps allow to organize and understand information faster and better.☆2Updated 3 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 3 years ago
- Google Meet Phishing Template For Gophish☆45Updated 2 years ago
- ☆90Updated 3 years ago
- ☆14Updated 3 years ago
- HTTP requests of FrontPage expolit☆25Updated 11 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 5 months ago
- ☆21Updated 7 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Noob Penetration tester☆11Updated last year
- Enumerate AWS permissions and resources.☆69Updated 3 years ago