PhrozenIO / win-brute-logonLinks
Crack any Microsoft Windows users password without any privilege (Guest account included)
☆1,152Updated last year
Alternatives and similar repositories for win-brute-logon
Users that are interested in win-brute-logon are comparing it to the libraries listed below
Sorting:
- Fake Windows logon screen to steal passwords☆1,354Updated 5 years ago
- PowerShell ReverseTCP Shell - Framework☆1,056Updated 2 years ago
- The Shadow Attack Framework☆1,111Updated 2 years ago
- A PowerShell script anti-virus evasion tool☆1,141Updated 2 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,868Updated 2 years ago
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.☆1,510Updated 3 years ago
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,373Updated 4 years ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,553Updated 8 months ago
- Mimikatz implementation in pure Python☆3,059Updated 3 weeks ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆766Updated 5 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,742Updated 4 months ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,103Updated 3 years ago
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler☆1,182Updated 2 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,713Updated 8 months ago
- Undetectable Windows Payload Generation☆1,599Updated 2 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,426Updated 2 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,506Updated 2 years ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,801Updated 4 years ago
- 🐧 Abuse of Google Colab for cracking hashes.☆948Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,161Updated last month
- Steal Net-NTLM Hash using Bad-PDF☆1,116Updated 4 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,508Updated 7 months ago
- Mass scan IPs for vulnerable services☆1,036Updated 3 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,844Updated last year
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,283Updated 3 years ago
- Windows Exploits☆1,283Updated 5 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆607Updated 10 months ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆1,954Updated last week
- C2 Powershell Command & Control Framework with BuiltIn Commands☆497Updated last year
- Windows Exploit Suggester - Next Generation☆4,492Updated this week