0xsyr0 / vx-underground-wordlist
Wordlist to crack .zip-file password
☆200Updated 2 years ago
Alternatives and similar repositories for vx-underground-wordlist:
Users that are interested in vx-underground-wordlist are comparing it to the libraries listed below
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆291Updated last year
- A repository of credential stealer formats☆190Updated 3 weeks ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆361Updated 2 weeks ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆139Updated 3 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆179Updated 3 weeks ago
- Nuke It From Orbit - remove AV/EDR with physical access☆252Updated 2 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆391Updated 2 weeks ago
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆121Updated 11 months ago
- ☆132Updated last year
- ☆155Updated last year
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆287Updated 6 months ago
- Windows And Ways To Break It☆100Updated last year
- Nuclei templates for honeypots detection.☆196Updated last year
- ☆184Updated last year
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- Azure mindmap for penetration tests☆175Updated last year
- Lab used for workshop and CTF☆172Updated last week
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆175Updated 6 months ago
- Free training course offered at Hack Space Con 2023☆137Updated last year
- A collection of tools that I use in CTF's or for assessments☆89Updated last week
- A RedTeam Toolkit☆394Updated 3 months ago
- C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.☆360Updated last month
- ☆78Updated 2 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆447Updated 2 months ago
- ☆338Updated last year
- A scalable web app features LiveView authentication, user roles and permission system, and secure S3/Wasabi uploads. It calculates file h…☆84Updated last month
- Amsi Bypass payload that works on Windwos 11☆375Updated last year
- Analyse your malware to surgically obfuscate it☆450Updated 3 weeks ago
- ☆297Updated 3 months ago