☆407Oct 2, 2020Updated 5 years ago
Alternatives and similar repositories for creddump7
Users that are interested in creddump7 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automatically exported from code.google.com/p/creddump☆285May 8, 2019Updated 6 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆612Feb 6, 2015Updated 11 years ago
- A little toolbox to play with Microsoft Kerberos in C☆1,517Dec 14, 2021Updated 4 years ago
- ☆1,494Dec 31, 2022Updated 3 years ago
- PowerTools is a collection of PowerShell projects with a focus on offensive operations.☆2,192Dec 28, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Small modification version of p0wnedShell☆39Apr 25, 2016Updated 10 years ago
- My musings with PowerShell☆2,715Nov 19, 2021Updated 4 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,859Jun 15, 2020Updated 5 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆170Jun 8, 2017Updated 8 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆2,713Dec 12, 2024Updated last year
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆454Apr 22, 2016Updated 10 years ago
- Payload Generation Framework☆1,979Aug 21, 2024Updated last year
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆465Oct 3, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PowerShell Runspace Post Exploitation Toolkit☆1,550Aug 2, 2019Updated 6 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,831Jan 19, 2020Updated 6 years ago
- Netview enumerates systems using WinAPI calls☆299Jan 30, 2022Updated 4 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆528Apr 14, 2023Updated 3 years ago
- PowerShell Pass The Hash Utils☆1,756Dec 9, 2018Updated 7 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆180Oct 21, 2018Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,975Aug 17, 2020Updated 5 years ago
- SMBMap is a handy SMB enumeration tool☆2,038Jan 6, 2026Updated 4 months ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Aug 18, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,671Nov 28, 2020Updated 5 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,768Dec 18, 2021Updated 4 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449May 25, 2022Updated 3 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,910Jan 24, 2024Updated 2 years ago
- Active Directory forensic framework☆333Mar 24, 2022Updated 4 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 7 years ago
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆2,006Oct 10, 2018Updated 7 years ago
- PowerShell MachineAccountQuota and DNS exploit tools☆1,461Jan 11, 2023Updated 3 years ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,320Nov 22, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Jun 20, 2017Updated 8 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,124Feb 10, 2021Updated 5 years ago
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago
- ☆741Jan 16, 2021Updated 5 years ago
- A tool to abuse Exchange services☆2,303Jun 10, 2024Updated last year
- C# implementation of harmj0y's PowerView☆1,094Mar 22, 2024Updated 2 years ago
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆1,115May 29, 2024Updated last year