SNMP-Brute – Fast SNMP brute force, enumeration, CISCO config downloader and password cracking script

SNMP-Brute - Fast SNMP brute force, enumeration, CISCO config downloader and password cracking script SNMP brute force, enumeration, CISCO config downloader and password cracking script. Listens for any responses to the brute force community strings, effectively minimising wait time.Requirementsmetasploitsnmpwalksnmpstatjohn the ripperUsagepython snmp-brute.py -t [IP]Options--help, -h show this help message and exit--file=DICTIONARY, -f DICTIONARY Dictionary file--target=IP,

Ketshash – A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs

Ketshash - A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.The tool was published as part of the Pass-The-Hash detection research - more details on Pass-The-Hash detection are

SwishDbgExt – Incident Response & Digital Forensics Debugging Extension

SwishDbgExt - Incident Response & Digital Forensics Debugging Extension SwishDbgExt is a Microsoft WinDbg debugging extension that expands the set of available commands by Microsoft WinDbg, but also fixes and improves existing commands. This extension has been developed by Matt Suiche (@msuiche) – feel free to reach out on support@comae.io ask for more features, offer

macro_pack – Tool Used To Automatize Obfuscation And Generation Of Ms Office Documents For Pentest, Demo, And Social Engineering Assessments

macro_pack - Tool Used To Automatize Obfuscation And Generation Of Ms Office Documents For Pentest, Demo, And Social Engineering Assessments The macro_pack is a tool used to automatize obfuscation and generation of retro formats such as MS Office documents or VBS like format. This tool can be used for redteaming, pentests, demos, and social engineering

Autorize – Automatic Authorization Enforcement Detection Extension For Burp Suite

Autorize - Automatic Authorization Enforcement Detection Extension For Burp Suite Autorize is an automatic authorization enforcement detection extension for Burp Suite. It was written in Python by Barak Tawily, an application security expert, and Federico Dotta, a security expert at Mediaservice.net. Autorize was designed to help security testers by performing automatic authorization tests. With the

Hershell – Simple TCP reverse shell written in Go

Hershell - Simple TCP reverse shell written in Go Simple TCP reverse shell written in Go. It uses TLS to secure the communications, and provide a certificate public key fingerprint pinning feature, preventing from traffic interception.Supported OS are:WindowsLinuxMac OSFreeBSD and derivativesWhy ?Although meterpreter payloads are great, they are sometimes spotted by AV products.The goal of

Vegile – Tool for Post exploitation Techniques in Linux

Vegile - Tool for Post exploitation Techniques in Linux Vegile is a tool for Post exploitation Techniques in linux. Post Exploitation techniques will ensure that we maintain some level of access and can potentially lead to deeper footholds into our targets trusted network.How it worksThis tool will setting up your backdoor/rootkits when backdoor already setup

EvilURL v2.0 – An Unicode Domain Phishing Generator for IDN Homograph Attack

EvilURL v2.0 - An Unicode Domain Phishing Generator for IDN Homograph Attack Generate unicode evil domains for IDN Homograph Attack and detect them.PREREQUISITESpython 3.x for evilurl3.pyTESTED ON: Kali Linux - ROLLING EDITIONCLONEgit clone https://github.com/UndeadSec/EvilURL.gitRUNNINGcd EvilURLpython3 evilurl.pyCHANGELOG Full script updated to Python 3.x{ Python 2.x support closed } CheckURL Module.{ Now you can