automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks
☆17Feb 19, 2023Updated 3 years ago
Alternatives and similar repositories for eaptyper
Users that are interested in eaptyper are comparing it to the libraries listed below
Sorting:
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆50Jul 18, 2025Updated 7 months ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago
- Collection of antivirus bypass techniques☆13Nov 20, 2023Updated 2 years ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Aug 31, 2023Updated 2 years ago
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆16Apr 30, 2021Updated 4 years ago
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- Converts Half-WPA handshake to hashcat☆19Oct 29, 2018Updated 7 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- Exploits Unauth Docker API☆43Apr 18, 2025Updated 10 months ago
- PyCes (Python Code Scanner) - Enhanced Security Static Analysis Tool for Python☆11Apr 18, 2019Updated 6 years ago
- A script to enumerate valid usernames based on the requests response times.☆22May 3, 2022Updated 3 years ago
- Gophish companion script for sms phishing.☆19Dec 10, 2019Updated 6 years ago
- A quick and dirty way to bypass encrypted EPA to connect to a NetScaler Gateway☆20Oct 11, 2019Updated 6 years ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆38Dec 5, 2025Updated 2 months ago
- NTP command & control☆18Oct 14, 2020Updated 5 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 4 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆21Jul 31, 2022Updated 3 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Registry hive parsing the async way☆25Oct 29, 2025Updated 4 months ago
- results of scraping OneDrive from February 2022 - March 2025☆27Apr 29, 2025Updated 10 months ago
- Tool queries the OpenAI API to enhance the description, impact, and recommendation keys of a nuclei template.☆21Apr 1, 2023Updated 2 years ago
- PowerShell module to play with Kerberos S4U extensions☆23Sep 14, 2017Updated 8 years ago
- Coerce Windows authentication by generating, distributing, and cleaning up poisoned files at scale.☆34Jun 17, 2025Updated 8 months ago
- Enumerate and check domains for Azure tenants☆59Feb 1, 2022Updated 4 years ago
- ☆31Sep 23, 2022Updated 3 years ago
- Quick python script to replace the NtAPI functions within SysWhispers' assembly and header files with random strings☆28May 30, 2022Updated 3 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Aug 29, 2022Updated 3 years ago