DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale via SMB
☆15Jun 24, 2016Updated 9 years ago
Alternatives and similar repositories for CredSwissArmy
Users that are interested in CredSwissArmy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- DEPRECATED USE v3!☆59Sep 8, 2015Updated 10 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆170Mar 7, 2018Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- Stochastic Traffic Factoring Utility☆16Nov 5, 2016Updated 9 years ago
- ☆78May 24, 2018Updated 7 years ago
- Offensive Data Storage☆61Sep 1, 2016Updated 9 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆24Apr 30, 2016Updated 9 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- Interactive remote PowerShell Payload☆78Jan 21, 2016Updated 10 years ago
- Websocket based egress tester☆20Nov 23, 2016Updated 9 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A tool for configuring and using MITM proxies from firefox☆46Dec 17, 2016Updated 9 years ago
- A web interface for Hashcat/oclHashcat☆30Nov 15, 2016Updated 9 years ago
- ☆12Sep 4, 2013Updated 12 years ago
- Dump LSASS process in Task Manager without triggering Defender.☆18Apr 6, 2023Updated 3 years ago
- SMB Auto authentication Vulnerability☆34Aug 1, 2016Updated 9 years ago
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Jul 6, 2016Updated 9 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- ☆21Mar 18, 2019Updated 7 years ago
- Simulation of nervous system☆10Oct 30, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Tool/service to detect Man in the Middle attacks with Canary Requests☆56Oct 8, 2016Updated 9 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 10 years ago
- Updated the FoxGlove Security WebLogic serialization exploit.☆31Mar 23, 2017Updated 9 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- DNS traffic indexer and analyzer☆26Oct 7, 2014Updated 11 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆16Apr 13, 2015Updated 11 years ago
- ☆16Sep 7, 2017Updated 8 years ago