snmpwn: SNMPv3 User Enumerator and Attack tool
SNMPwn is an SNMPv3 user enumerator and attack tool. It is a legitimate security tool designed to be used by security professionals and penetration testers against hosts you have permission...
SNMPwn is an SNMPv3 user enumerator and attack tool. It is a legitimate security tool designed to be used by security professionals and penetration testers against hosts you have permission...
evilscan Massive ip/port scanner Features individual IP or IP range scan individual port, ports list, or ports range banner grabbing (not fully implemented, works with native verbose ports only) IAC...
LDAPDomainDump Active Directory information dumper via LDAP In an Active Directory domain, a lot of interesting information can be retrieved via LDAP by any authenticated user (or machine). This makes...
Angry IP scanner is a very fast IP address and port scanner. It can scan IP addresses in any range as well as any of their ports. It is cross-platform...
Information Gathering / Network PenTest / Vulnerability Analysis
by do son · Published December 27, 2018 · Last modified May 1, 2024
Sandmap is a tool for supporting network and system reconnaissance using the massive Nmap engine. It provides a user-friendly interface, automates and speeds up scanning and allows you to easily use many...
Information Gathering / Vulnerability Analysis
by do son · Published December 25, 2018 · Last modified October 10, 2021
nmap-bootstrap-xsl A Nmap XSL implementation with Bootstrap. Download git clone https://github.com/honze-net/nmap-bootstrap-xsl.git How to use Add the nmap-bootstrap.xsl as stylesheet to your Nmap scan. Example: xx Open the scanme.xml with your Web browser. It...
Information Gathering / Vulnerability Analysis
by do son · Published December 16, 2018 · Last modified May 1, 2024
Mail Security Testing Framework A testing framework for mail security and filtering solutions. IMPORTANT: Don’t do anything evil with this! Tests of cloud or otherwise hosted solutions should always be approved...
Information Gathering / Web Information Gathering
by do son · Published December 13, 2018 · Last modified October 10, 2021
GoogleScraper – Scraping search engines professionally GoogleScraper parses Google search engine results (and many other search engines _) easily and in a fast way. It allows you to extract all found...
Exploitation / Information Gathering / Vulnerability Analysis / Web Exploitation / Web Information Gathering / Web Vulnerability Analysis
by do son · Published December 10, 2018 · Last modified October 10, 2021
Pocsuite is an open-sourced remote vulnerability testing and proof-of-concept development framework developed by the Knownsec Security Team. It comes with a powerful proof-of-concept engine, many niche features for the ultimate penetration...
Swaks’ primary design goal is to be a flexible, scriptable, transaction-oriented SMTP test tool. It handles SMTP features and extensions such as TLS, authentication, and pipelining; multiple version of the...
Information Gathering / Social Engineering
by do son · Published November 25, 2018 · Last modified November 4, 2024
trape (open source) People tracker on the Internet: Learn to track the world, to avoid being traced. Trape is an OSINT analysis and research tool, which allows people to track and execute...
reconerator This is a custom .NET assembly which will perform a number of situational awareness activities. There are a number of current feature sets: BASIC – Obtains information from the...
RainDance A toolkit for enumerating and collecting information from Office 365. Raindance uses built-in powershell modules, namely from the MSOnline & AzureAD powershell modules to log into Office 365 tenants...
Information Gathering / Password Attacks
by do son · Published October 31, 2018 · Last modified June 23, 2021
SSH Auditor The best way to scan for weak ssh passwords on your network Features ssh-auditor will automatically: Re-check all known hosts as new credentials are added. It will only...
Information Gathering / Network PenTest / Post Exploitation
by do son · Published October 30, 2018 · Last modified November 4, 2024
ADRecon: Active Directory Recon ADRecon is a tool which extracts and combines various artifacts (as highlighted below) out of an AD environment. The information can be presented in a specially...