Re4son / ChimichurriLinks
Some minor changes to Chimichurri to get it to compile on modern machines
☆44Updated 10 years ago
Alternatives and similar repositories for Chimichurri
Users that are interested in Chimichurri are comparing it to the libraries listed below
Sorting:
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- Repo with various Red Team scripts☆147Updated 5 years ago
- AWS S3 Bucket/Object Finder☆25Updated 8 years ago
- GodOfWar - Malicious Java WAR builder with built-in payloads☆126Updated 6 years ago
- Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE☆57Updated 5 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 6 years ago
- ☆42Updated 7 years ago
- Verification tools for CVE-2016-1287☆33Updated 8 years ago
- Samba, NFS shares spider and grepper☆71Updated 7 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Updated 3 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆120Updated 5 years ago
- Custom tools and projects about security☆110Updated 5 months ago
- Tool to enumerate shares from Windows hosts.☆69Updated 3 years ago
- ☆22Updated 8 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Updated 7 years ago
- Tooling and commands for common red team and Infrastructure testing tasks☆43Updated 3 years ago
- ☆73Updated 8 years ago
- ☆29Updated 7 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Updated 7 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37Updated 10 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Updated 3 years ago
- miscellaneous stuff☆21Updated 10 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆82Updated 8 years ago
- ☆78Updated 7 years ago
- ☆128Updated 2 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆75Updated last week
- Terribad PrivEsc enumeration script for Windows systems☆15Updated 5 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Updated 3 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Updated 6 years ago
- C# Targeted Attack Reconnissance Tools☆121Updated 4 years ago