C0axx / Modified-Thycotic-Secret-StealerView external linksLinks
Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption
☆19Aug 5, 2022Updated 3 years ago
Alternatives and similar repositories for Modified-Thycotic-Secret-Stealer
Users that are interested in Modified-Thycotic-Secret-Stealer are comparing it to the libraries listed below
Sorting:
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- POC tool to abuse windows server failover clusters☆54Aug 7, 2025Updated 6 months ago
- Powershell script that decrypts the data stored within a Thycotic Secret Server☆85Aug 3, 2020Updated 5 years ago
- ☆88Jul 28, 2022Updated 3 years ago
- Talk slides and material☆37Mar 24, 2024Updated last year
- Repository of Volatility3 plugins☆22Mar 22, 2023Updated 2 years ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Dec 17, 2023Updated 2 years ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Sep 15, 2023Updated 2 years ago
- ☆27May 1, 2023Updated 2 years ago
- AAD related enumeration in Nim☆132Sep 7, 2023Updated 2 years ago
- Gmail Enumeration using a glitch described here https://blog.0day.rocks/abusing-gmail-to-get-previously-unlisted-e-mail-addresses-41544b6…☆28Aug 4, 2022Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆50May 3, 2022Updated 3 years ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- top usernames from azure survey 2025☆14Apr 25, 2025Updated 9 months ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Feb 9, 2026Updated last week
- ☆28Oct 11, 2025Updated 4 months ago
- Bloodhound Portable for Windows☆53Apr 1, 2023Updated 2 years ago
- Collection of tools to use with Azure Applications☆112Oct 13, 2023Updated 2 years ago
- ☆11Oct 24, 2022Updated 3 years ago
- ☆13Oct 21, 2023Updated 2 years ago
- ☆13Dec 27, 2014Updated 11 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- ☆29Jan 19, 2023Updated 3 years ago
- A module for interacting with the ConfigMgr AdminService☆27Oct 20, 2023Updated 2 years ago
- ☆160Feb 8, 2025Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆136Jan 22, 2025Updated last year
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 6 years ago
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Sep 23, 2025Updated 4 months ago
- ☆19Mar 9, 2021Updated 4 years ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Feb 15, 2024Updated 2 years ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 6 months ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆399Aug 15, 2025Updated 6 months ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆302Sep 7, 2023Updated 2 years ago
- Ludus FastMCP enables AI-powered management of Ludus cyber ranges through natural language commands. The server exposes **157 tools** acr…☆69Dec 31, 2025Updated last month