Bl4ckM1rror / KerberoShutdown
☆16Updated 2 years ago
Alternatives and similar repositories for KerberoShutdown:
Users that are interested in KerberoShutdown are comparing it to the libraries listed below
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- ☆21Updated last year
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 8 months ago
- Noob Penetration tester☆11Updated 10 months ago
- Magento Security Scanner☆15Updated 3 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Execute embedded Mimikatz☆13Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- ☆35Updated 4 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- Compiled Binaries for Sharp Suite☆13Updated 5 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 3 years ago
- Windows 权限提升 BadPotato☆12Updated 3 years ago
- Serving files with conditions, serverside keying and more.☆17Updated 2 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆23Updated 3 years ago
- ☆24Updated 4 years ago
- ☆10Updated 3 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 4 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- ☆19Updated last year
- Finding SSL Blindspots for Red Teams☆32Updated 4 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 2 years ago