Pinned Repositories
bfac
BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source code.
Checklists
Pentesting checklists for various engagements
impacket
Impacket is a collection of Python classes for working with network protocols.
LinkedInEnum
Scrapes LinkedIn and returns a CSV file containing the username, first name, last name and title for each enumerated user.
PhishBait
Tools for harvesting email addresses for phishing attacks |
portia
Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the network
punter
Hunt domain names using DNSDumpster, WHOIS, Reverse WHOIS, Shodan, Crimeflare
RDPInception
A proof of concept for the RDP Inception Attack
ruler
A tool to abuse Exchange services
sLNKy
p0wner's Repositories
p0wner/sLNKy
p0wner/bfac
BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source code.
p0wner/Checklists
Pentesting checklists for various engagements
p0wner/impacket
Impacket is a collection of Python classes for working with network protocols.
p0wner/LinkedInEnum
Scrapes LinkedIn and returns a CSV file containing the username, first name, last name and title for each enumerated user.
p0wner/PhishBait
Tools for harvesting email addresses for phishing attacks |
p0wner/portia
Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the network
p0wner/punter
Hunt domain names using DNSDumpster, WHOIS, Reverse WHOIS, Shodan, Crimeflare
p0wner/RDPInception
A proof of concept for the RDP Inception Attack
p0wner/ruler
A tool to abuse Exchange services
p0wner/SessionGopher
SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be run remotely or locally.
p0wner/SimplyEmail
Email recon made fast and easy, with a framework to build on
p0wner/tools