JakeWnuk / Rules
My rules
☆16Updated last week
Related projects ⓘ
Alternatives and complementary repositories for Rules
- Password Transformation Tool (ptt) is a versatile utility designed for password cracking.☆21Updated this week
- Top hashpwn rules☆11Updated this week
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆20Updated 11 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆35Updated 6 months ago
- fully async implementation of Dirkjan's ROADTools☆31Updated 8 months ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆15Updated 2 months ago
- Enumerate the Domain for Readable and Writable Shares☆16Updated 5 months ago
- Nemesis agent for Mythic☆24Updated 2 months ago
- ☆44Updated 3 weeks ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆64Updated last month
- Microsoft365 Device Code Phishing Framework☆34Updated 3 years ago
- Find Inbound Email Domains☆21Updated 11 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆38Updated 9 months ago
- ☆36Updated last month
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 11 months ago
- Lifetime AMSI bypass.☆36Updated 4 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆28Updated 7 months ago
- ☆20Updated last month
- Living off the land searches for explorer and sharepoint☆52Updated 3 weeks ago
- ☆43Updated 4 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆34Updated last year
- Leveraging AWS Lambda Function URLs for C2 Redirection☆22Updated last year
- 🌩️ Collection of BloodHound queries for Azure☆44Updated 3 months ago
- Discord C2 Profile for Mythic☆24Updated 7 months ago
- ☆35Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆47Updated 2 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆69Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆29Updated 5 months ago