Pinned Repositories
Above
Network Vulnerability Scanner
Ad-mindmap2023
Ad mindmaps
chainsaw
Rapidly Search and Hunt through Windows Forensic Artefacts
Cisco-Smart-Exploit
Cisco SmartInstall Exploit [CVE-2018-0171]
Cruelty
Gratuitous ARP Injector
DeepBlueCLI
EIGRPWN
Tools for performing attacks on EIGRP domains
evtx
A Fast (and safe) parser for the Windows XML Event Log (EVTX) format
Grit
STP & RSTP Root Hijacking Exploits
hayabusa
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
mav51's Repositories
mav51/Above
Network Vulnerability Scanner
mav51/Ad-mindmap2023
Ad mindmaps
mav51/chainsaw
Rapidly Search and Hunt through Windows Forensic Artefacts
mav51/Cisco-Smart-Exploit
Cisco SmartInstall Exploit [CVE-2018-0171]
mav51/Cruelty
Gratuitous ARP Injector
mav51/DeepBlueCLI
mav51/EIGRPWN
Tools for performing attacks on EIGRP domains
mav51/evtx
A Fast (and safe) parser for the Windows XML Event Log (EVTX) format
mav51/Grit
STP & RSTP Root Hijacking Exploits
mav51/hayabusa
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
mav51/impacket
Impacket is a collection of Python classes for working with network protocols.
mav51/namemash
mav51/NetworkExploitation
Some tools for performing network attacks.
mav51/NetworkNightmare
Network Pentesting Mindmap by Caster
mav51/PCredz
This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.
mav51/PersistenceSniper
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Made with ❤️ by @last0x00 and @dottor_morte
mav51/PowerHub
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
mav51/VLANPWN
VLAN attacks toolkit
mav51/ADReplStatus
AD Replication Status Tool
mav51/ARP-Scan
mav51/awesome-flipperzero-withModules
🐬 A collection of awesome resources for the Flipper Zero device.
mav51/dnscan
mav51/ForceAdmin
Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
mav51/MailSniper
MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, insider intel, network architecture information, etc.). It can be used as a non-administrative user to search their own email, or by an administrator to search the mailboxes of every user in a domain.
mav51/mav51
mav51/samytools
Simple tools to make reverse engineering and console cowboying easier, primarily by data translation and manipulation + file handle piping. Mostly *nix tools with an emphasis on macOS.
mav51/sipvicious
SIPVicious OSS has been around since 2007 and is actively updated to help security teams, QA and developers test SIP-based VoIP systems and applications. This toolset is useful in simulating VoIP hacking attacks against phone systems especially through identification, scanning, extension enumeration and password cracking.
mav51/Spoofy
Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.
mav51/SprayingToolkit
Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient
mav51/TokenTacticsV2
A fork of the great TokenTactics with support for CAE and token endpoint v2