0xZDH / burp-password-sprayView external linksLinks
This extension allows a user to specify a lockout policy in order to automate a password spray attack via Intruder.
☆25Apr 1, 2020Updated 5 years ago
Alternatives and similar repositories for burp-password-spray
Users that are interested in burp-password-spray are comparing it to the libraries listed below
Sorting:
- ☆15Apr 27, 2020Updated 5 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆12Jul 30, 2021Updated 4 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- Scrape, Hunt, and Transform names and usernames☆125Nov 19, 2022Updated 3 years ago
- Post-exploitation NTLM password hash extractor☆19Apr 7, 2021Updated 4 years ago
- Username lists that I created.☆17Aug 9, 2021Updated 4 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- Tools/scripts I used/developed during the EXP-301 course.☆26May 17, 2022Updated 3 years ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Dec 17, 2023Updated 2 years ago
- Modular Enumeration and Password Spraying Framework☆129Apr 10, 2024Updated last year
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Dec 29, 2016Updated 9 years ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆32Nov 6, 2019Updated 6 years ago
- Password spraying script and helper for creating password lists☆34Sep 4, 2020Updated 5 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- generates weak passwords based on current date☆43Jun 27, 2024Updated last year
- 用於 Java, Design Pattern 的教育學習專案,包含一些 demo code。☆10Nov 29, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/xml2rfc-xxe☆11Jul 9, 2022Updated 3 years ago
- Scripts to run your own SIM bank SMS receiver☆13Sep 8, 2023Updated 2 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Advanced Windows authentication token extraction and decryption tool for red team operations and security research☆83Dec 30, 2025Updated last month
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated last month
- Browser extension that extracts users from LinkedIn company pages☆165Apr 24, 2023Updated 2 years ago
- A Golang implant that uses Slack as a command and control server☆47Jun 10, 2020Updated 5 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 4 months ago
- Scalable URL obfuscator service☆11Feb 14, 2023Updated 3 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 13 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- Hide the memory of the process in the Linux kernel.☆10Dec 8, 2020Updated 5 years ago
- The method and files used to generate Sysmon event logs, push them to a remote Splunk, and ingest/normalize the data for analysis.☆10Sep 28, 2020Updated 5 years ago
- A C# implementation that disables Windows Firewall bypassing UAC☆17Oct 23, 2024Updated last year
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- Linux kernel-mode and user-space with wine/MinGW/Windows compability hacking library.☆12Sep 15, 2022Updated 3 years ago
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 3 months ago
- The ARP Scanner☆11Apr 19, 2014Updated 11 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago