LeeHolmes / UntypoLinks
Help recover passwords / etc. that were incorrectly entered with a typo
☆13Updated 8 years ago
Alternatives and similar repositories for Untypo
Users that are interested in Untypo are comparing it to the libraries listed below
Sorting:
- Offensive Data Storage☆60Updated 8 years ago
- ☆53Updated 10 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 8 years ago
- Windows PowerShell domain scanning tool☆54Updated 9 years ago
- Interactive remote PowerShell Payload☆77Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Updated 10 years ago
- PowerShell implementations of path-finding algorithms using graph theory☆79Updated 9 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Updated 10 years ago
- Black Hills Info Sec has a great tool on Byt3Bl33d3rs github utilizing Gmail as C2 tansport. Using that Idea I wanted something that did…☆12Updated 9 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- post-exploitation tools☆15Updated 7 years ago
- Scripts to query local admins quickly☆9Updated 9 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆61Updated 7 years ago
- Why hunt when you can seine?☆21Updated 10 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- Automatically performs the SMB relay attack☆72Updated 9 years ago
- PowerShell scripts for the PoshSec Framework☆22Updated 10 years ago
- Easy Window domain access☆51Updated 11 years ago
- ☆42Updated 11 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- ☆23Updated 9 years ago
- ☆50Updated 7 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆45Updated 8 years ago
- Network Mapping and Enumeration Framework☆22Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Powershell Persistence Locator☆66Updated 8 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- A proof of concept demonstrating the use of Google Drive for command and control.☆86Updated 6 years ago