☆17Apr 20, 2022Updated 3 years ago
Alternatives and similar repositories for echidna
Users that are interested in echidna are comparing it to the libraries listed below
Sorting:
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 4 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Web page preview and analysis tool☆12Jan 11, 2023Updated 3 years ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Aug 13, 2020Updated 5 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Windows PowerShell module to help in the auditing of Active Directory environments.☆50Mar 22, 2017Updated 8 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 2 years ago
- Implementation of ITaskHandler in C++☆14Feb 11, 2023Updated 3 years ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- ☆20Oct 14, 2013Updated 12 years ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆18Apr 30, 2021Updated 4 years ago
- ☆41Jul 4, 2018Updated 7 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 7 months ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Security related useful Powershell scripts☆19Sep 13, 2019Updated 6 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- Minimalist Custom .NET Core Garbage Collector☆23Jun 15, 2020Updated 5 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- Detect & filter duplicate hashcat rules☆47Jan 14, 2025Updated last year
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Jun 9, 2021Updated 4 years ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- Ansible role to detect Log4Shell exploitation attempts☆18Dec 22, 2021Updated 4 years ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Dec 17, 2023Updated 2 years ago
- A tool to extract and abuse access tokens from AzureCLI for bypassing 2FA/MFA.☆47Feb 15, 2020Updated 6 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Feb 12, 2015Updated 11 years ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆25Feb 8, 2022Updated 4 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- A collection of scripts I use with hashcat☆21Nov 28, 2016Updated 9 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- Collection of rules and debug data for hashcat☆25Dec 2, 2025Updated 2 months ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- RPC Monitor based on The ETW Microsoft-Windows-Rpc provider☆24Mar 22, 2020Updated 5 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- Remotely enables Restricted Admin Mode☆215Sep 3, 2021Updated 4 years ago
- SharpElevator is a C# implementation of Elevator for UAC bypass. This UAC bypass was originally discovered by James Forshaw and publishe…☆61Aug 31, 2022Updated 3 years ago