Network-Wizard-Money-Gang / EchosounderLinks
petit programme marrant
☆18Updated 2 weeks ago
Alternatives and similar repositories for Echosounder
Users that are interested in Echosounder are comparing it to the libraries listed below
Sorting:
- IPSpinner works as a local proxy that redirects requests through external services.☆79Updated 6 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆155Updated 7 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆69Updated 3 weeks ago
- Check robustness of your (their) Active Directory accounts passwords☆44Updated 6 months ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆81Updated 4 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆61Updated 3 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆65Updated last year
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆139Updated 10 months ago
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆17Updated 2 months ago
- Bitpixie exploitation PoC☆58Updated 2 months ago
- ☆13Updated 2 years ago
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆56Updated 2 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated 11 months ago
- ☆86Updated last month
- ☆55Updated 11 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆51Updated 6 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆131Updated 2 months ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆67Updated last month
- Generate a report with charts and statistics about cracked passwords in XLSX format☆33Updated 6 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆62Updated 9 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆153Updated 3 months ago
- Artifact monitoring that ensures fairplay☆78Updated 7 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆94Updated 5 months ago
- Detect common NFS server misconfigurations☆66Updated 4 months ago
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆49Updated 6 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆78Updated 10 months ago
- Permanently disable EDRs as local admin☆102Updated 2 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- A python script to automatically dump files and source code of a Symfony server in debug mode.☆12Updated 7 months ago