trackerjacker
|
1.9.0-3 |
3 |
0.00
|
Map and track WiFi networks and devices through raw 802.11 monitoring |
WSDMatty
|
2023-07-14 06:02 (UTC) |
thc-ssl-dos
|
1.4-3 |
0 |
0.00
|
THC-SSL-DOS is a tool to verify the performance of SSL by flooding connections |
orphan
|
2019-03-18 23:00 (UTC) |
skipfish
|
2.10b_2kali7-1 |
1 |
0.00
|
A fully automated, active web application security reconnaissance tool |
GI_Jack
|
2024-05-12 22:53 (UTC) |
python-pywerview-git
|
r183.2fd83cf-1 |
0 |
0.00
|
A (partial) Python rewriting of PowerSploit's PowerView.(Python3 fork) |
orphan
|
2020-07-03 22:25 (UTC) |
python-pywerview
|
0.7.0-1 |
0 |
0.00
|
A (partial) Python rewriting of PowerSploit's PowerView. |
GI_Jack
|
2024-10-07 15:25 (UTC) |
python-bloodhound
|
1.7.2-1 |
1 |
0.00
|
Python based ingestor for BloodHound, based on Impacket |
GI_Jack
|
2024-05-12 22:41 (UTC) |
python-aiosmb
|
0.4.11-1 |
1 |
0.00
|
Fully asynchronous SMB library written in pure python. |
GI_Jack
|
2024-10-07 15:08 (UTC) |
nemesis
|
1.8-1 |
2 |
0.00
|
command-line network packet crafting and injection utility |
GI_Jack
|
2021-07-13 15:22 (UTC) |
nbtool-git
|
20140415.r2-1 |
0 |
0.00
|
Some tools for NetBIOS and DNS investigation, attacks, and communication. |
orphan
|
2019-03-18 22:58 (UTC) |
metasploit-payload-creator
|
1.4.5-1 |
1 |
0.00
|
A wrapper to generate multiple types of payloads, based on users choice. |
GI_Jack
|
2019-05-19 23:40 (UTC) |
mad-metasploit-archive-git
|
r178.0ebe2c0-1 |
0 |
0.00
|
A Collection of Metasploit Plugins, Modules and Scripts |
orphan
|
2020-02-16 20:17 (UTC) |
mad-metasploit-git
|
r178.0ebe2c0-1 |
0 |
0.00
|
A Collection of Metasploit Plugins, Modules and Scripts |
orphan
|
2020-02-16 20:17 (UTC) |
getsploit
|
0.3.0-1 |
1 |
0.00
|
Command line utility for searching and downloading exploits |
orphan
|
2021-01-22 00:13 (UTC) |
fwsnort
|
1.6.8-1 |
0 |
0.00
|
Fwsnort translates Snort rules into equivalent iptables rules |
orphan
|
2021-08-15 15:50 (UTC) |
creds.py-git
|
r17.1ec8297-1 |
1 |
0.00
|
Harvest FTP/POP/IMAP/HTTP/IRC credentials along with interesting data from each of the protocols. |
orphan
|
2019-03-18 22:52 (UTC) |
bloodhound
|
4.3.1-1 |
1 |
0.00
|
Use graph theory to reveal the hidden and often unintended relationships within an Active Directory |
GI_Jack
|
2023-12-31 19:20 (UTC) |