ANSSI-FR / audit-radiusView external linksLinks
A RADIUS authentication server audit tool
☆79Oct 15, 2018Updated 7 years ago
Alternatives and similar repositories for audit-radius
Users that are interested in audit-radius are comparing it to the libraries listed below
Sorting:
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- libflutter.so(s) modified for traffic intercepting removing certificate pinning validation. Dart version is 2.10.5☆12Jul 11, 2021Updated 4 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- ☆98Mar 16, 2016Updated 9 years ago
- CORS checking☆34Jul 16, 2018Updated 7 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 3 years ago
- Active Directory permissions (ACL/ACE) auditing tools☆148Jun 15, 2017Updated 8 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- Tool to make in memory man in the middle☆125Oct 8, 2018Updated 7 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆412Dec 24, 2019Updated 6 years ago
- A WebDAV PROPFIND C2 tool☆119Aug 27, 2019Updated 6 years ago
- ☆264Jul 15, 2022Updated 3 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- Some scripts and exploits☆147Jul 9, 2018Updated 7 years ago
- 👻👁🔍📡 If an attacker has created a fake enterprise wireless network, my goal is to deceive him.☆18Feb 10, 2019Updated 7 years ago
- Executes lateral movement through PowerPoint DCOM objects☆20Feb 3, 2018Updated 8 years ago
- An Insider Threat Toolkit☆155Dec 17, 2018Updated 7 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Aug 13, 2018Updated 7 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Dec 18, 2017Updated 8 years ago
- The Outlook HTML Leak Test Project☆131May 12, 2018Updated 7 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- Open source Active Directory security audit framework.☆137Jan 15, 2018Updated 8 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Sep 1, 2018Updated 7 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆305Sep 7, 2022Updated 3 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Nov 19, 2017Updated 8 years ago
- Active Directory Control Paths auditing and graphing tools☆678Dec 17, 2020Updated 5 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆72Aug 31, 2020Updated 5 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Sysmon Config Pusher - Modernized☆32Jan 7, 2026Updated last month
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- A one stop shop for all cyber tooling, frameworks and hacking methodologies☆11Jul 25, 2021Updated 4 years ago