RedSiege / ProxmarkWrapperLinks
A wrapper around the Proxmark3 client that will alert the user of specific events
☆30Updated 4 years ago
Alternatives and similar repositories for ProxmarkWrapper
Users that are interested in ProxmarkWrapper are comparing it to the libraries listed below
Sorting:
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆46Updated 5 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆53Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- Red Team Projects with chat.openai.com.☆17Updated 2 years ago
- ☆27Updated 2 years ago
- AutoPoC Generator HoneyPoC☆35Updated 6 months ago
- wsnet☆27Updated last month
- Custom pentesting tools☆25Updated 4 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- ☆33Updated 2 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆29Updated last month
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 5 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 6 months ago
- A swiss army knife for pentesting networks☆26Updated 3 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Updated 7 months ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Updated 6 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆21Updated 4 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated 2 months ago
- Pwdlyser is an all encompassing security auditing tool. This repo serves as the open-source base for the new version of Pwdlyser (previou…☆25Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 9 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year