Extract credentials and other useful info from network captures
☆78Nov 3, 2022Updated 3 years ago
Alternatives and similar repositories for CredSLayer
Users that are interested in CredSLayer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆132Aug 10, 2021Updated 4 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- Active Directory password spraying tool. Auto fetches user list and avoids potential lockouts.☆131Nov 25, 2021Updated 4 years ago
- ☆145Oct 31, 2023Updated 2 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- Get all AD objects which are hidden from you☆18Aug 21, 2017Updated 8 years ago
- HTTP Proxy using Amazon Lambda for source IP cycling☆15Apr 6, 2021Updated 4 years ago
- MSBuild without MSbuild.exe☆135Dec 21, 2020Updated 5 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,441Mar 2, 2026Updated 3 weeks ago
- Shellcode Loader using indirect syscalls☆16Jan 21, 2024Updated 2 years ago
- Windows Privilege Escalation☆18Jun 11, 2022Updated 3 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆95Jun 6, 2024Updated last year
- Deploy redteam infrastructure☆17Mar 9, 2021Updated 5 years ago
- ☆29May 16, 2023Updated 2 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- Sample code for finding AWS Account ID of an S3 bucket.☆49Feb 23, 2024Updated 2 years ago
- Roast in the Middle☆294Sep 19, 2025Updated 6 months ago
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- Kerberoast Detection Script☆30Oct 31, 2024Updated last year
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 5 years ago
- ☆57May 13, 2020Updated 5 years ago
- Kerberoast with ACL abuse capabilities☆624Dec 16, 2024Updated last year
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆17Jan 31, 2024Updated 2 years ago
- FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE acces…☆431Nov 12, 2025Updated 4 months ago
- Inject Encrypted Commands Into EMF Shapes for C2 In VBA / Office Malware☆39Jul 10, 2020Updated 5 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- Track torrent downloads☆14Dec 9, 2022Updated 3 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- Plugins for the Serpico Project☆23Dec 4, 2018Updated 7 years ago
- REST API backend for Reconmap☆47Mar 15, 2026Updated last week