This extension allows a user to specify a lockout policy in order to automate a password spray attack via Intruder.
☆25Apr 1, 2020Updated 5 years ago
Alternatives and similar repositories for burp-password-spray
Users that are interested in burp-password-spray are comparing it to the libraries listed below
Sorting:
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆12Jul 30, 2021Updated 4 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- Scrape, Hunt, and Transform names and usernames☆128Nov 19, 2022Updated 3 years ago
- Username lists that I created.☆17Aug 9, 2021Updated 4 years ago
- Post-exploitation NTLM password hash extractor☆19Apr 7, 2021Updated 4 years ago
- Tools/scripts I used/developed during the EXP-301 course.☆26May 17, 2022Updated 3 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Dec 17, 2023Updated 2 years ago
- Modular Enumeration and Password Spraying Framework☆129Apr 10, 2024Updated last year
- Some useful scripts I have written or collected☆82Jul 24, 2023Updated 2 years ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆32Nov 6, 2019Updated 6 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Dec 29, 2016Updated 9 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- Password spraying script and helper for creating password lists☆34Sep 4, 2020Updated 5 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- A large collection of blogs 🦐☆13Apr 12, 2025Updated 10 months ago
- Advanced Windows authentication token extraction and decryption tool for red team operations and security research☆84Dec 30, 2025Updated 2 months ago
- Automatically exported from code.google.com/p/xml2rfc-xxe☆11Jul 9, 2022Updated 3 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- generates weak passwords based on current date☆44Jun 27, 2024Updated last year
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆91May 10, 2020Updated 5 years ago
- 用於 Java, Design Pattern 的教育學習專案,包含一些 demo code。☆10Nov 29, 2017Updated 8 years ago
- Browser extension that extracts users from LinkedIn company pages☆167Apr 24, 2023Updated 2 years ago
- A Golang implant that uses Slack as a command and control server☆47Jun 10, 2020Updated 5 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- ☆12Mar 15, 2020Updated 5 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- ☆11Jun 8, 2022Updated 3 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- programmatic binary patching using ptrace☆13Aug 9, 2025Updated 7 months ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- ☆12Mar 1, 2021Updated 5 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Leveraging TPM2 TCG Logs (Measured Boot) to Detect UEFI Drivers and Pre-Boot Applications☆22Mar 28, 2025Updated 11 months ago
- Aruba Instant (IAP) - Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- Hide the memory of the process in the Linux kernel.☆10Dec 8, 2020Updated 5 years ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 13 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago