RedTeamPentesting / bitwarden-windows-helloLinks
Tools to Exploit Bitwarden v2023.3.0 with Windows Hello
☆31Updated last year
Alternatives and similar repositories for bitwarden-windows-hello
Users that are interested in bitwarden-windows-hello are comparing it to the libraries listed below
Sorting:
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆125Updated last week
- Timestomp Tool to flatten MAC times with a specific timestamp☆49Updated 3 weeks ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆59Updated 10 months ago
- CVE-2013-4786 Go exploitation tool☆39Updated last month
- ☆76Updated last year
- Diana Credential Recovery Framework☆65Updated 3 months ago
- A port scanner written purely in PowerShell.☆82Updated 2 years ago
- ☆55Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆39Updated 11 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆87Updated 3 weeks ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated 2 years ago
- hiding in plain sight: part 2☆45Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆56Updated last year
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆125Updated last year
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆72Updated 2 months ago
- ECC Public Key Cryptography☆37Updated 2 years ago
- ☆35Updated 2 years ago
- ☆109Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆79Updated last year
- Docker container for running CobaltStrike 4.10☆37Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated last year
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆33Updated last year
- Repo for all my exploits/PoCs☆53Updated 7 months ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆17Updated last year
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Updated 3 weeks ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆45Updated last year
- Use WordPress pingback.ping to transfer files.☆16Updated last year
- POC for DLL Proxying / Hijacking☆62Updated 7 months ago
- Covert data exfiltration via DNS☆50Updated 10 months ago