Raikia / CredSwissArmyView external linksLinks
DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale via SMB
☆15Jun 24, 2016Updated 9 years ago
Alternatives and similar repositories for CredSwissArmy
Users that are interested in CredSwissArmy are comparing it to the libraries listed below
Sorting:
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- Stochastic Traffic Factoring Utility☆15Nov 5, 2016Updated 9 years ago
- DEPRECATED USE v3!☆59Sep 8, 2015Updated 10 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- ☆12Sep 4, 2013Updated 12 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- Interactive remote PowerShell Payload☆78Jan 21, 2016Updated 10 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 12 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Jul 6, 2016Updated 9 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆170Mar 7, 2018Updated 7 years ago
- Offensive Data Storage☆61Sep 1, 2016Updated 9 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- DNS traffic indexer and analyzer☆26Oct 7, 2014Updated 11 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Dump LSASS process in Task Manager without triggering Defender.☆18Apr 6, 2023Updated 2 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- This is a tool to instantly test if an application handles SSL certificates the way it is supposed to.☆25Mar 17, 2023Updated 2 years ago
- A set of Bash scripts that allows you to repeatably collect and compare baseline audit data from Linux and Windows systems☆20Oct 19, 2013Updated 12 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- ☆78May 24, 2018Updated 7 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆45Sep 12, 2016Updated 9 years ago
- Linux bootkit generator☆22Jan 10, 2015Updated 11 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- Websocket based egress tester☆20Nov 23, 2016Updated 9 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- ☆24Jul 6, 2015Updated 10 years ago
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 6 years ago
- PyCommands for Immunity Debugger☆29Mar 30, 2013Updated 12 years ago
- A guided tour of docker basics☆24Nov 2, 2017Updated 8 years ago
- yara rules for cryptography detection☆30Apr 28, 2014Updated 11 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Feb 8, 2019Updated 7 years ago
- One-off scripts☆52Sep 4, 2017Updated 8 years ago