Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the password can be changed by Blue Team.
☆41May 7, 2023Updated 2 years ago
Alternatives and similar repositories for StreetCred
Users that are interested in StreetCred are comparing it to the libraries listed below
Sorting:
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- ☆23Mar 4, 2025Updated last year
- Addon for BHCE☆58Apr 1, 2025Updated 11 months ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- Windows NTLM Authentication Backdoor☆16Jan 27, 2022Updated 4 years ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 6 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Jul 21, 2025Updated 8 months ago
- Repository For CTF Write-ups☆17Sep 11, 2023Updated 2 years ago
- A collection of Turbo Intruder scripts.☆71Feb 1, 2025Updated last year
- ☆11Apr 10, 2021Updated 4 years ago
- Basic Linux binary shim method on the passwd binary from the shadow package to steal credentials as they are changed.☆14Nov 14, 2024Updated last year
- The official website for The Discord Analytics for Risks & Threats Project.☆22Dec 29, 2025Updated 2 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 8 months ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆111May 30, 2025Updated 9 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated last month
- Golang Port Knocking for Linux + Windows☆18Feb 22, 2022Updated 4 years ago
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 8 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 11 months ago
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆29Nov 26, 2025Updated 3 months ago
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆41Mar 12, 2026Updated last week
- Discord C2 for Redteam....Need a better name☆142May 7, 2023Updated 2 years ago
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- eBPF Memory Dump Tool☆101Feb 26, 2026Updated 3 weeks ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated last year
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated 11 months ago
- ☆43Jul 17, 2025Updated 8 months ago
- FrogPost: postMessage Security Testing Tool☆108Dec 4, 2025Updated 3 months ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 5 months ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆61Feb 5, 2025Updated last year
- A very simple open source implementation of Google's Project Naptime☆182Mar 27, 2025Updated 11 months ago
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆106Dec 2, 2024Updated last year
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆105Feb 6, 2025Updated last year
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆100Mar 14, 2026Updated last week
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Windows NTLM Authentication Backdoor☆241Jan 15, 2025Updated last year