0xsyr0 / vx-underground-wordlist
Wordlist to crack .zip-file password
☆201Updated 2 years ago
Alternatives and similar repositories for vx-underground-wordlist:
Users that are interested in vx-underground-wordlist are comparing it to the libraries listed below
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆291Updated last year
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆368Updated 2 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆184Updated 2 months ago
- ☆186Updated last year
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆415Updated last month
- ☆299Updated last month
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆299Updated 8 months ago
- A collection of tools that I use in CTF's or for assessments☆97Updated 2 months ago
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- A repository of credential stealer formats☆210Updated 3 weeks ago
- Nuke It From Orbit - remove AV/EDR with physical access☆258Updated 4 months ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆352Updated 2 months ago
- ☆157Updated last year
- ☆136Updated 2 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- Tool designed to exfiltrate OneDrive Business OCR Data☆110Updated 2 months ago
- Amsi Bypass payload that works on Windwos 11☆377Updated last year
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆736Updated 3 weeks ago
- Azure mindmap for penetration tests☆181Updated last year
- Lab used for workshop and CTF☆179Updated 2 months ago
- ☆103Updated 7 months ago
- ☆276Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆119Updated 4 months ago
- Retired TrustedSec Capabilities☆247Updated 5 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆271Updated last year
- ☆349Updated last year
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆194Updated 3 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆182Updated last year
- ☆534Updated last year