zkvL / secutils
☆17Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for secutils
- ☆12Updated 7 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Self contained htaccess shells and attacks☆14Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- Automated enumeration☆30Updated 3 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆39Updated 6 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆11Updated 6 years ago
- Plugins for the Serpico Project☆22Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆37Updated last year
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 7 years ago
- Script to automate, manage, and multithread Nikto scans.☆58Updated 4 years ago
- A Custom Scanner for Burp☆30Updated 10 years ago
- Password spraying script and helper for creating password lists☆33Updated 4 years ago
- BurpJDSer-ng☆26Updated this week
- Automated install process for Phishing Frenzy☆23Updated 9 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆23Updated 10 years ago
- Custom stagers with python encrypting proxy☆40Updated 9 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Updated 7 years ago
- Intelligent threat hunter and phishing servers☆47Updated 5 years ago
- Various tools, scripts, and techniques☆19Updated 4 years ago
- AV Bypass☆28Updated 6 years ago