DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale via SMB
☆15Jun 24, 2016Updated 9 years ago
Alternatives and similar repositories for CredSwissArmy
Users that are interested in CredSwissArmy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- DEPRECATED USE v3!☆59Sep 8, 2015Updated 10 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- 3 tools that work together to simplify reconaissance of Windows File Shares☆170Mar 7, 2018Updated 8 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- Stochastic Traffic Factoring Utility☆16Nov 5, 2016Updated 9 years ago
- ☆78May 24, 2018Updated 7 years ago
- Offensive Data Storage☆61Sep 1, 2016Updated 9 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆24Apr 30, 2016Updated 9 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- Interactive remote PowerShell Payload☆78Jan 21, 2016Updated 10 years ago
- Websocket based egress tester☆20Nov 23, 2016Updated 9 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- nmapcli is a tool written in Python with pre-defined scan templates to automate Nmap scans☆11Sep 10, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆139Jul 13, 2017Updated 8 years ago
- A tool for configuring and using MITM proxies from firefox☆46Dec 17, 2016Updated 9 years ago
- A web interface for Hashcat/oclHashcat☆30Nov 15, 2016Updated 9 years ago
- ☆12Sep 4, 2013Updated 12 years ago
- Dump LSASS process in Task Manager without triggering Defender.☆18Apr 6, 2023Updated 2 years ago
- SMB Auto authentication Vulnerability☆34Aug 1, 2016Updated 9 years ago
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Jul 6, 2016Updated 9 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- ☆21Mar 18, 2019Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Simulation of nervous system☆10Oct 30, 2016Updated 9 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆56Oct 8, 2016Updated 9 years ago
- Updated the FoxGlove Security WebLogic serialization exploit.☆31Mar 23, 2017Updated 9 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- DNS traffic indexer and analyzer☆26Oct 7, 2014Updated 11 years ago
- ☆16Sep 7, 2017Updated 8 years ago