KMGbully / ikebrute
Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with psk-crack using a wordlist mangled with john and hobo64.rule
☆10Updated 8 years ago
Alternatives and similar repositories for ikebrute:
Users that are interested in ikebrute are comparing it to the libraries listed below
- ☆17Updated 7 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆18Updated 9 years ago
- ☆19Updated 7 years ago
- Generates anti-sandbox analysis HTA files without payloads☆15Updated 8 years ago
- ☆11Updated 8 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆53Updated 11 months ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Updated 5 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- Small scripts to assist in pentesting☆19Updated 4 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 5 years ago
- Assists in mass exportation of Nessus scans☆19Updated 6 years ago
- Office 365 MFA capture toolkit☆12Updated 7 years ago
- Short handy snippets from the @mwrlabs team☆20Updated 7 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- Mimikatz HashClash☆12Updated 9 years ago
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- ☆17Updated 9 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- A PowerShell script to parse the docx/docm file format and update the template location.☆17Updated 5 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆32Updated 6 years ago
- ☆13Updated 7 years ago
- Issues to consider when planning a red team exercise.☆15Updated 7 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- Automating those tasks which can or should be automated☆61Updated 7 years ago