0xsyr0 / vx-underground-wordlist
Wordlist to crack .zip-file password
☆201Updated 2 years ago
Alternatives and similar repositories for vx-underground-wordlist:
Users that are interested in vx-underground-wordlist are comparing it to the libraries listed below
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆295Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆175Updated last year
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- Azure mindmap for penetration tests☆173Updated last year
- Nuke It From Orbit - remove AV/EDR with physical access☆252Updated last month
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆130Updated 2 months ago
- Free training course offered at Hack Space Con 2023☆136Updated last year
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆337Updated 9 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆94Updated last year
- A collection of tools that I use in CTF's or for assessments☆72Updated this week
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆650Updated 8 months ago
- Lab used for workshop and CTF☆166Updated 3 months ago
- ☆131Updated last year
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆352Updated 3 months ago
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment☆346Updated this week
- Tool to remotely dump secrets from the Windows registry☆415Updated 3 weeks ago
- PasteBomb C2-less RAT☆316Updated 2 months ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆283Updated 5 months ago
- ☆136Updated last month
- Windows And Ways To Break It☆100Updated last year
- A repository of credential stealer formats☆129Updated this week
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆156Updated 11 months ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆108Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆489Updated 2 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆130Updated 5 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆115Updated 3 weeks ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆245Updated last week
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 7 months ago
- ☆277Updated 7 months ago
- A scalable web app features LiveView authentication, user roles and permission system, and secure S3/Wasabi uploads. It calculates file h…☆84Updated last week