InfamousSYN / eaptyperLinks
automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks
☆18Updated 2 years ago
Alternatives and similar repositories for eaptyper
Users that are interested in eaptyper are comparing it to the libraries listed below
Sorting:
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 2 years ago
- Passworld is a fully customizable wordlist generator☆15Updated 8 months ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 10 months ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated last year
- A swiss army knife for pentesting networks☆26Updated 2 years ago
- Wireless Pentesting Device☆21Updated 4 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆19Updated 4 months ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- ☆28Updated last year
- wsnet☆25Updated this week
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12Updated 4 years ago
- Easily-guessable Password Generator for Password Spray Attack☆21Updated 5 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Custom pentesting tools☆25Updated 4 years ago
- miscellaneous sploit scripts/hacks☆16Updated 4 months ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆14Updated 3 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Updated 3 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Pwdlyser is an all encompassing security auditing tool. This repo serves as the open-source base for the new version of Pwdlyser (previou…☆25Updated 9 months ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago