S3cur3Th1sSh1t / BitwardenDecryptBruteLinks
Wordlist attacks on Bitwarden data.json files
☆49Updated 3 years ago
Alternatives and similar repositories for BitwardenDecryptBrute
Users that are interested in BitwardenDecryptBrute are comparing it to the libraries listed below
Sorting:
- Obtain and parse SSL certificates☆87Updated 3 years ago
- ☆12Updated 4 years ago
- WMI SA stuffs☆30Updated 3 years ago
- Smuggle a file to a user's browser☆20Updated 3 years ago
- Asynchronous RDP/VNC client for Python (GUI)☆71Updated 6 months ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆45Updated 3 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Updated 3 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 2 years ago
- A collection of my presentation materials.☆17Updated last year
- Right-To-Left Override POC☆34Updated 3 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Updated 5 years ago
- ☆39Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- Windows internals and exploitation tricks☆102Updated last month
- basic proxy as an azure function serverless app☆18Updated 2 years ago
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- Python tool to find vulnerable AD object and generating csv report☆14Updated 3 years ago
- ☆68Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆62Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- RDP Checker☆63Updated last year
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 2 months ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 3 years ago
- C# exfiltration tool☆12Updated 3 years ago
- ☆38Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 2 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆68Updated last year