JorianWoltjer / keepass-dump-extractorLinks
Find and collect parts of a Keepass master key to recover it in plain text from a memory dump
☆20Updated 2 years ago
Alternatives and similar repositories for keepass-dump-extractor
Users that are interested in keepass-dump-extractor are comparing it to the libraries listed below
Sorting:
- PowerShell script to automate enabling RDP, local admin user creation, and configuring firewall rules for RDP access.☆42Updated last year
- ☆18Updated last year
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆57Updated last year
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆25Updated 10 months ago
- ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an int…☆50Updated this week
- A collection of tools that I use in CTF's or for assessments☆107Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆113Updated 2 years ago
- A little cheatsheet for NetExec☆32Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆35Updated 2 months ago
- Tool for enumerating Active Directory environments☆48Updated 2 years ago
- A powerful and delightful PHP WebShell☆67Updated 11 months ago
- ☆76Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- ☆12Updated last year
- ☆44Updated 3 years ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆103Updated 5 months ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25Updated 8 months ago
- One line command and control backdoors for APIs and web applications.☆51Updated last year
- Creating a Malicious Macro using MS Word☆25Updated 3 years ago
- Tools used for Pentesting☆22Updated 2 years ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆41Updated 2 years ago
- ☆35Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- ☆76Updated last year
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Updated 2 years ago
- ☆16Updated 3 years ago