☆17Apr 20, 2022Updated 3 years ago
Alternatives and similar repositories for echidna
Users that are interested in echidna are comparing it to the libraries listed below
Sorting:
- Windows PowerShell module to help in the auditing of Active Directory environments.☆50Mar 22, 2017Updated 9 years ago
- Security related useful Powershell scripts☆19Sep 13, 2019Updated 6 years ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- Implementation of ITaskHandler in C++☆14Feb 11, 2023Updated 3 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 4 years ago
- ☆41Jul 4, 2018Updated 7 years ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆18Apr 30, 2021Updated 4 years ago
- Script to install pentest tools on Alpine Linux☆12Jul 3, 2015Updated 10 years ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Jun 9, 2021Updated 4 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 8 months ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Aug 13, 2020Updated 5 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 2 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- PowerShell to Slack C2☆109May 31, 2018Updated 7 years ago
- POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's s…☆105Jul 2, 2017Updated 8 years ago
- Web page preview and analysis tool☆12Jan 11, 2023Updated 3 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- ☆33Apr 20, 2022Updated 3 years ago
- Remotely enables Restricted Admin Mode☆215Sep 3, 2021Updated 4 years ago
- ReverseDSC Orchestrator for ActiveDirectory☆21Jun 12, 2023Updated 2 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- ☆21Dec 8, 2022Updated 3 years ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Dec 17, 2023Updated 2 years ago
- ☆20Oct 14, 2013Updated 12 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Dec 4, 2020Updated 5 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Jun 20, 2021Updated 4 years ago
- A python implementation of send_arp.c from the linux-ha project☆16Apr 25, 2016Updated 9 years ago
- ☆11Mar 5, 2016Updated 10 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- Detect & filter duplicate hashcat rules☆48Jan 14, 2025Updated last year
- PowerShell module for logging using log4net library.☆19Nov 6, 2020Updated 5 years ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Minimalist Custom .NET Core Garbage Collector☆23Jun 15, 2020Updated 5 years ago
- ☆74Jun 17, 2025Updated 9 months ago