AdrianCitu / burp-tabnabbing-extensionLinks
Burp Suite Professional extension in Java for Tabnabbing attack
☆13Updated 7 years ago
Alternatives and similar repositories for burp-tabnabbing-extension
Users that are interested in burp-tabnabbing-extension are comparing it to the libraries listed below
Sorting:
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 6 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆52Updated last year
- ☆13Updated 4 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33Updated last year
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Updated 4 years ago
- Enumerate RIDs using pure Python☆32Updated last year
- AWS S3 Bucket/Object Finder☆25Updated 8 years ago
- ☆21Updated 6 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆33Updated 8 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Updated 7 years ago
- Alphanumeric Encoder☆25Updated 7 years ago
- ☆17Updated 8 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Updated 6 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆32Updated 4 years ago
- Short handy snippets from the @mwrlabs team☆20Updated 7 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 7 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Updated 6 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Updated 5 years ago
- Windows 10 Exploit☆30Updated 7 years ago