S3cur3Th1sSh1t / BitwardenDecryptBruteLinks
Wordlist attacks on Bitwarden data.json files
☆49Updated 3 years ago
Alternatives and similar repositories for BitwardenDecryptBrute
Users that are interested in BitwardenDecryptBrute are comparing it to the libraries listed below
Sorting:
- Right-To-Left Override POC☆36Updated 3 years ago
- Obtain and parse SSL certificates☆87Updated 3 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Updated 5 years ago
- ☆68Updated 2 years ago
- Tools to Exploit Bitwarden v2023.3.0 with Windows Hello☆30Updated last year
- ☆12Updated 4 years ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆12Updated 6 months ago
- Smuggle a file to a user's browser☆20Updated 3 years ago
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- ☆39Updated 2 years ago
- Windows internals and exploitation tricks☆105Updated 2 months ago
- Asynchronous RDP/VNC client for Python (GUI)☆71Updated 8 months ago
- XOR-based shellcode encoder☆31Updated 2 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Updated 4 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 3 years ago
- ☆27Updated 4 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆48Updated 4 months ago
- C# exfiltration tool☆12Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆68Updated last year
- WMI SA stuffs☆30Updated 3 years ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆20Updated 4 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆29Updated 3 years ago
- AWS Testing and Reporting Management Tool☆20Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 3 years ago
- A collection of my presentation materials.☆17Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago