JorianWoltjer / keepass-dump-extractorLinks
Find and collect parts of a Keepass master key to recover it in plain text from a memory dump
☆20Updated 2 years ago
Alternatives and similar repositories for keepass-dump-extractor
Users that are interested in keepass-dump-extractor are comparing it to the libraries listed below
Sorting:
- ☆23Updated last year
- ☆25Updated 4 months ago
- A little cheatsheet for NetExec☆32Updated last year
- PowerShell script to automate enabling RDP, local admin user creation, and configuring firewall rules for RDP access.☆42Updated last year
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆23Updated 3 years ago
- ☆12Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆35Updated 2 months ago
- ☆47Updated 3 years ago
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆21Updated last year
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an int…☆46Updated last week
- Tool for enumerating Active Directory environments☆48Updated 2 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- Oh My Pentest Report is a customizable Oh My Zsh theme designed for pentesters.☆21Updated 7 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Updated 2 years ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆62Updated 7 months ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated 2 years ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated last year
- Discord C2 Profile for Mythic☆33Updated 11 months ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- ☆34Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆56Updated last year
- Tools used for Pentesting☆22Updated 2 years ago
- Check robustness of your (their) Active Directory accounts passwords☆45Updated 10 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆126Updated last month
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Updated 5 months ago
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- A very simple python script to encode and decode PowerShell one-liners.☆25Updated 3 years ago
- ☆16Updated 3 years ago