ImpostorKeanu / eavesarp-ngLinks
☆42Updated 6 months ago
Alternatives and similar repositories for eavesarp-ng
Users that are interested in eavesarp-ng are comparing it to the libraries listed below
Sorting:
- Find Inbound Email Domains☆35Updated 2 years ago
- ☆52Updated last year
- Payload Generation Workflow☆40Updated 5 months ago
- Your Skyfall Infrastructure Pack☆89Updated last month
- fully async implementation of Dirkjan's ROADTools☆34Updated 9 months ago
- POC tool to abuse windows server failover clusters☆49Updated 4 months ago
- Extract registry and NTDS secrets from local or remote disk images☆45Updated 9 months ago
- SMB Audit Tool you were looking for☆23Updated 2 years ago
- ☆57Updated 6 months ago
- Claude MCP server to perform analysis on ROADrecon data☆48Updated 9 months ago
- ☆44Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated last year
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- ☆65Updated last year
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆32Updated 9 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 9 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated last year
- SACL Scanner is a tool designed to scan and analyze SACLs.☆48Updated 10 months ago
- ☆34Updated 5 months ago
- Lifetime AMSI bypass.☆35Updated 8 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Updated 2 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Updated 2 years ago
- Installing wazuh SIEM Unified XDR and SIEM protection☆31Updated 6 months ago
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆47Updated 2 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- ☆41Updated 10 months ago
- ☆29Updated 2 years ago
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆48Updated 2 months ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆43Updated last week