☆17Apr 20, 2022Updated 3 years ago
Alternatives and similar repositories for echidna
Users that are interested in echidna are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows PowerShell module to help in the auditing of Active Directory environments.☆50Mar 22, 2017Updated 9 years ago
- Security related useful Powershell scripts☆19Sep 13, 2019Updated 6 years ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- Implementation of ITaskHandler in C++☆14Feb 11, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 4 years ago
- ☆41Jul 4, 2018Updated 7 years ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆18Apr 30, 2021Updated 4 years ago
- Script to install pentest tools on Alpine Linux☆12Jul 3, 2015Updated 10 years ago
- Terraform modules networking related vpc,subnets,route tables..☆19Jun 4, 2025Updated 10 months ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Jun 9, 2021Updated 4 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 8 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Aug 13, 2020Updated 5 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 3 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- PowerShell to Slack C2☆109May 31, 2018Updated 7 years ago
- POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's s…☆105Jul 2, 2017Updated 8 years ago
- Web page preview and analysis tool☆12Jan 11, 2023Updated 3 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- ☆33Apr 20, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Remotely enables Restricted Admin Mode☆215Sep 3, 2021Updated 4 years ago
- ReverseDSC Orchestrator for ActiveDirectory☆21Jun 12, 2023Updated 2 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- ☆21Dec 8, 2022Updated 3 years ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Dec 17, 2023Updated 2 years ago
- ☆20Oct 14, 2013Updated 12 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Dec 4, 2020Updated 5 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Jun 20, 2021Updated 4 years ago
- A python implementation of send_arp.c from the linux-ha project☆16Apr 25, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆11Mar 5, 2016Updated 10 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- Detect & filter duplicate hashcat rules☆48Jan 14, 2025Updated last year
- PowerShell module for logging using log4net library.☆19Nov 6, 2020Updated 5 years ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Minimalist Custom .NET Core Garbage Collector☆23Jun 15, 2020Updated 5 years ago