Leoid / EncoderLinks
Alphanumeric Encoder
☆25Updated 7 years ago
Alternatives and similar repositories for Encoder
Users that are interested in Encoder are comparing it to the libraries listed below
Sorting:
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- AWS S3 Bucket/Object Finder☆25Updated 8 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 6 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆39Updated 5 years ago
- ☆36Updated 5 years ago
- miscellaneous stuff☆21Updated 10 years ago
- Samba, NFS shares spider and grepper☆71Updated 7 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated last year
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 6 years ago
- ☆22Updated 8 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆33Updated 8 years ago
- ☆110Updated 7 years ago
- A proof of concept for delivering webbugs via AWS lambda☆46Updated 7 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Updated 4 years ago
- ☆98Updated 6 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆32Updated 4 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Updated 6 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆80Updated 4 years ago
- LetMeOutOfYour.net Resources☆20Updated 5 years ago
- Capture all RabbitMQ messages being sent through a broker.☆32Updated 4 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 7 years ago
- Tools that I've created/used during CTP-OSCE☆10Updated 6 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆74Updated 5 years ago
- ☆16Updated 6 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Issues to consider when planning a red team exercise.☆15Updated 8 years ago
- SysCon14 release☆55Updated 8 years ago
- Methods of C2☆21Updated 10 years ago
- Pypykatz agent implemented in .NET☆84Updated 6 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Updated 7 years ago