Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager
☆23Jan 4, 2025Updated last year
Alternatives and similar repositories for MasterKeyBrute
Users that are interested in MasterKeyBrute are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆33Mar 6, 2025Updated last year
- ☆13Jan 5, 2026Updated 3 months ago
- Speed up your pentest enumeration☆83Oct 5, 2025Updated 6 months ago
- Hardening Active Directory version 2☆386Dec 10, 2025Updated 4 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆131Dec 15, 2025Updated 4 months ago
- Identify the accounts most vulnerable to dictionary attacks☆121Apr 2, 2025Updated last year
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- A stealthy reverse shell built with native PowerShell and Server-Sent Events (SSE). No polling. No sockets. Just pure HTTP and real-time …☆22Apr 23, 2025Updated last year
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Shellcode loader based on indirect syscall☆22Feb 9, 2025Updated last year
- ☆16May 3, 2024Updated last year
- Captures network traffic app made in Rust.☆81Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- AzureKitty is an Office 365 and Azure configuration audit tool☆15Jan 28, 2024Updated 2 years ago
- Protect your data in minutes !☆125Nov 5, 2024Updated last year
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123May 16, 2023Updated 2 years ago
- ☆27Jul 2, 2024Updated last year
- SwitchToOpen - The open source shift☆306Nov 21, 2025Updated 5 months ago
- Extract WinSCP Credentials from any Windows System or winscp config file☆23Mar 19, 2026Updated last month
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆22Jun 28, 2024Updated last year
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆86Jan 26, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 4 years ago
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆14Aug 20, 2024Updated last year
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- A simple PoC crypto ransomware in Python☆19Jul 31, 2016Updated 9 years ago
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated 2 years ago
- ☆16Aug 25, 2025Updated 8 months ago
- A small and dirty python3 based script to download courses from Infosec Institute.☆12Oct 6, 2021Updated 4 years ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- Bash and ZSH integration for Impacket☆73Nov 6, 2025Updated 5 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- GLPI vulnerabilities checking tool☆165Mar 30, 2026Updated 3 weeks ago
- ☆18Jan 9, 2025Updated last year
- ☆27May 1, 2023Updated 2 years ago
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- Scripts that automate portions of pentests.☆58Mar 18, 2026Updated last month
- Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulner…☆56Feb 2, 2025Updated last year
- ☆112Feb 13, 2024Updated 2 years ago