Git Repo and Filesystem credential scanner
☆18Sep 8, 2017Updated 8 years ago
Alternatives and similar repositories for PwnDelorean
Users that are interested in PwnDelorean are comparing it to the libraries listed below
Sorting:
- ☆10Nov 24, 2018Updated 7 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- An attempt to automated hunting for delegation access across the domain☆27Jan 17, 2019Updated 7 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- Network Mapping and Enumeration Framework☆22Nov 11, 2015Updated 10 years ago
- Parses Nmap XML files☆25Apr 29, 2015Updated 10 years ago
- ☆25Dec 13, 2016Updated 9 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆38Dec 13, 2020Updated 5 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆33Oct 2, 2017Updated 8 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Jun 4, 2019Updated 6 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Oct 14, 2017Updated 8 years ago
- A semi-autonomous robotic T-Shirt Cannon☆16Nov 20, 2014Updated 11 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)☆12Aug 22, 2025Updated 6 months ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- Generate and Permutate Context Aware Dictionaries for Application Testing☆11Aug 16, 2016Updated 9 years ago
- A simple application to calculate similarity between two files (text document) using Smith-Waterman algorithm that is used originally to …☆10Apr 15, 2017Updated 8 years ago
- ☆10Dec 17, 2022Updated 3 years ago
- CTF platform we wrote and used for justCTF 2019☆12Jun 25, 2022Updated 3 years ago
- Terraform script to deploy AD-based environment on Azure☆41Apr 22, 2023Updated 2 years ago
- ☆12Aug 17, 2025Updated 6 months ago
- Repoguard is a simple tool to check and alert on interesting changes in a git repository.☆48Feb 3, 2017Updated 9 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Adds a guard to disable ObjectInputStream.readObject☆11Dec 6, 2015Updated 10 years ago
- Distributed parallelization of tasks☆41Jan 21, 2014Updated 12 years ago
- Replace URLs which have been rewritten by Office 365 Advanced Threat Protection with the original URL.☆12May 18, 2021Updated 4 years ago
- libflutter.so(s) modified for traffic intercepting removing certificate pinning validation. Dart version is 2.10.5☆12Jul 11, 2021Updated 4 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago