ShutdownRepo / GeoWordlists
GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.
☆10Updated last year
Alternatives and similar repositories for GeoWordlists:
Users that are interested in GeoWordlists are comparing it to the libraries listed below
- ☆18Updated last year
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- Simple reverse ICMP shell☆13Updated 11 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- Nemesis agent for Mythic☆27Updated 7 months ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 11 months ago
- ☆12Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- ☆2Updated 3 months ago
- Ansible role that Installs Mythic☆14Updated 9 months ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆25Updated last year
- Extension functionality for the NightHawk operator client☆27Updated last year
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆20Updated 4 years ago
- Python3 tool to perform password spraying using RDP☆16Updated last year
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Updated 4 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- ☆17Updated 3 months ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆17Updated 2 months ago
- string encryption in Nim☆18Updated 10 months ago
- The Totally Legit Authentication Dialog☆12Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆13Updated 2 years ago
- wordlists for password cracking☆27Updated 2 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- Configurable, Community driven, HTTP C2 Profile☆17Updated last month
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 9 months ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆11Updated last month
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago