π A CLI tool to extract server certificates
β905Apr 13, 2026Updated this week
Alternatives and similar repositories for certificate-ripper
Users that are interested in certificate-ripper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hashβ51Oct 12, 2024Updated last year
- This repo is about Active Directory Advanced Threat Huntingβ650Feb 17, 2025Updated last year
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercerβ742May 19, 2023Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFAβ67Oct 6, 2023Updated 2 years ago
- β198Jan 18, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.β37Nov 16, 2023Updated 2 years ago
- A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embedβ¦β106Dec 8, 2025Updated 4 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alertsβ129Dec 23, 2025Updated 3 months ago
- Ubuntu Privilege Escalation bash one-liner using CVE-2023-32629 & CVE-2023-2640β108Nov 15, 2023Updated 2 years ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analystsβ172Nov 26, 2023Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).β60Apr 16, 2024Updated last year
- Custom Binary Ninja Themesβ12Nov 11, 2023Updated 2 years ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interactionβ13Feb 13, 2023Updated 3 years ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is deβ¦β819Updated this week
- Serverless GPU API endpoints on Runpod - Bonus Credits β’ AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive filesβ229Mar 30, 2026Updated 2 weeks ago
- A sock, with a wire, so you can tunnel all you desire.β296Jan 19, 2024Updated 2 years ago
- Pen Test Report Generation and Assessment Collaborationβ594Updated this week
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover seβ¦β1,514Mar 18, 2026Updated 3 weeks ago
- Security testing tool for analyzing HTTP 403 responses and identifying access control misconfigurations in web applications.β177Jan 6, 2026Updated 3 months ago
- β13Dec 21, 2023Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.β45Mar 8, 2024Updated 2 years ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.β622Jan 2, 2025Updated last year
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.β42Oct 18, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other obβ¦β484Oct 14, 2022Updated 3 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 β '.ini' Buffer Overflow (Unicode + SEH)β14Nov 1, 2023Updated 2 years ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.β325May 1, 2025Updated 11 months ago
- hauditor is a tool designed to analyze the security headers returned by a web page.β178Jul 6, 2024Updated last year
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.β¦β906Updated this week
- Web Path Finderβ60Nov 22, 2023Updated 2 years ago
- NetworkAssessment: Network Compromise Assessment Toolβ94May 31, 2024Updated last year
- Documents Exfiltration project for fun and educational purposesβ144Oct 10, 2023Updated 2 years ago
- β47Oct 27, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI β’ AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.β395Jan 20, 2026Updated 2 months ago
- Ask a TGS on behalf of another user without passwordβ482Mar 30, 2025Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environmentβ¦β146May 17, 2024Updated last year
- Simple Secure Static (HTTPS) File Server with embedded certificateβ48Apr 9, 2023Updated 3 years ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.β790Jan 9, 2025Updated last year
- Azure mindmap for penetration testsβ228Nov 21, 2023Updated 2 years ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cβ¦β1,111Nov 9, 2024Updated last year