Aiodnsbrute, Async, Bruteforcing, Downloads, Enumeration, Hacking Tools, OSINT, OSINT Resources, Pentesting, Recon, Red Team, Security Tools, Subdomin EnumerationA Python 3.5+ tool that uses asyncio to brute force domain names asynchronously. Speed It’s fast. Benchmarks on small VPS …
84
awsEnum, Bugbounty, Downloads, Enumeration, Hacking Tools, Security ToolsEnumrate AWS services! with no nosies awsEnum is a python script enumrate AWS services through the provided credential. ▄▄▄▄▄▄ ▄ …
73
Downloads, Enumeration, Hacking Tools, Microsoft, Oh365UserFinder, Python2, Python3, User EnumerationOh365UserFinder is used for identifying valid o365 accounts and domains without the risk of account lockouts. The tool parses responses …
99
Downloads, Enumeration, Hacking Tools, Password Spray, Pentest, Python, Python3, Security, Spray, Spray365, Traffic, UsernamesSpray365 is a password spraying tool that identifies valid credentials for Microsoft accounts (Office 365 / Azure AD). How is …
182
ADenum, Downloads, Enumeration, Hacking Tools, Kerberos, Python, WordlistAD Enum is a pentesting tool that allows to find misconfiguration through the protocol LDAP and exploit some of those …
141
Container, Downloads, Enumeration, Exploits, Git, Hacking Tools, Process, Scan, Script, Search, WebThe purpose of this script is to automate the web enumeration process and search for exploits and vulns. Added Tools …
168
Downloads, Emails, Enumeration, Go, golang, Hacking Tools, Microsoft, Recon, Reconnaissance, Teams, User EnumerationSometimes user enumeration could be sometimes useful during the reconnaissance of an assessment. This tool will determine if an email …
222
AWS, Blue Team, Credentials, Discovery, Distributed, Downloads, Enumeration, Exfiltration, Exploitation, Framework, golang, Hacking Tools, Information, Lateral MovementScour is a modern module based AWS exploitation framework written in golang, designed for red team testing and blue team …
267
Command Line, DLL Injection, Downloads, Enumeration, Hacking Tools, Hidden, Injection, PowerShell, Processes, Registry, Rootkit, Service Enumeration, WindowsRing 3 rootkit r77 is a ring 3 Rootkit that hides following entities from all processes: Files, directories, junctions, named …
279
Downloads, Enumeration, Gathering, Google Chrome, Hacking Tools, HTTP Server, Information Extraction, Information Gathering, Information Retrieval, Linux, Python3“linux-chrome-recon” is a Information gathering tool used to enumerate all possible data about an user from Google-Chrome browser from any …
238