AbrictoSecurity / Peap_Bomb
Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.
☆8Updated 3 years ago
Alternatives and similar repositories for Peap_Bomb:
Users that are interested in Peap_Bomb are comparing it to the libraries listed below
- ☆16Updated 4 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Simple C2 over the Trello API☆37Updated 2 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 3 years ago
- Reverse shell macro using Word VBA☆13Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- I used this to see if an EDR is running in Safe Mode☆34Updated 3 years ago
- ☆16Updated 4 years ago
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- Red Team C2 and Post Exploitation Code☆36Updated 3 weeks ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- Exactly what it sounds like, which is something rad☆20Updated 2 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆17Updated 2 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Updated 3 years ago
- Brute Force and Scan WinRm Service☆13Updated 5 years ago
- A little implant which SSH's back with a shell☆36Updated 2 years ago
- Finding SSL Blindspots for Red Teams☆30Updated 4 years ago
- ☆12Updated 3 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆21Updated 3 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- Execute embedded Mimikatz☆13Updated 3 years ago