PhrozenIO / win-brute-logon
Crack any Microsoft Windows users password without any privilege (Guest account included)
☆1,089Updated 10 months ago
Related projects: ⓘ
- Fake Windows logon screen to steal passwords☆1,285Updated 4 years ago
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.☆1,396Updated 2 years ago
- PowerShell ReverseTCP Shell - Framework☆1,034Updated 2 years ago
- The Shadow Attack Framework☆1,075Updated 2 years ago
- Mass scan IPs for vulnerable services☆1,022Updated 2 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,657Updated 2 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,283Updated 7 months ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,024Updated 2 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,761Updated last year
- A PowerShell script anti-virus evasion tool☆1,058Updated last year
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆1,992Updated this week
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,630Updated last week
- Privilege Escalation Project - Windows / Linux / Mac☆2,420Updated 2 years ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,184Updated last week
- Some scripts useful for red team activities☆1,551Updated 2 years ago
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other f…☆2,158Updated last month
- Wordlist, rules and masks from Kaonashi project (RootedCON 2019)☆962Updated 2 years ago
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,289Updated 3 years ago
- Mimikatz implementation in pure Python☆2,817Updated last month
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,460Updated 8 months ago
- Steal Net-NTLM Hash using Bad-PDF☆1,062Updated 4 years ago
- AntiVirus Evasion Tool☆1,637Updated 11 months ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,784Updated last year
- Starkiller is a Frontend for PowerShell Empire.☆1,344Updated 4 months ago
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler☆1,161Updated last year
- The ultimate WinRM shell for hacking/pentesting☆4,411Updated 2 months ago
- Windows Exploit Suggester - Next Generation☆4,131Updated this week
- Python Tool that gives you the ability to run Advanced Google Queries (Known as Google Dorks - Google Dorking)☆1,063Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆2,101Updated 8 months ago
- uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or direc…☆791Updated 2 years ago