zblurx / acherus
Acherus, The Docker Hold, is a containerized hacking environment gathering many tools and resources
☆14Updated last month
Alternatives and similar repositories for acherus:
Users that are interested in acherus are comparing it to the libraries listed below
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆16Updated 2 years ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆16Updated 6 years ago
- Custom pentesting tools☆24Updated 4 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 5 months ago
- wsnet☆24Updated this week
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated 8 months ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 4 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆7Updated 2 years ago
- Find open databases - Powered by Binaryedge.io☆12Updated 5 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆23Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- A swiss army knife for pentesting networks☆24Updated 2 years ago
- Modular framework to exploit UPS devices☆62Updated last year
- A script to automate keystrokes through a graphical desktop program.☆33Updated 2 months ago
- Automate Auxiliary Module in Metasploit☆20Updated 3 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆21Updated 5 months ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- Poc script for ProxyShell exploit chain in Exchange Server☆17Updated 2 years ago
- Recon-ng modules for basic OSINT.☆11Updated 2 years ago
- Active Directory information dumper via LDAP☆12Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- A python script file to forensically examine remote computer networks - It can analyse smb and ldap active directory systems, start phis…☆14Updated 2 weeks ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆20Updated 11 months ago
- Modified version of PEAS client for offensive operations☆38Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆22Updated 2 years ago