ShutdownRepo / GeoWordlists
GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.
☆10Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for GeoWordlists
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated last year
- Ansible role that Installs Mythic☆14Updated 4 months ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- ☆17Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆27Updated 6 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- Nemesis agent for Mythic☆24Updated 2 months ago
- Simple reverse ICMP shell☆13Updated 6 months ago
- Golang Implementation of Hell's gate☆15Updated last year
- A simple to use single-include Windows API resolver☆17Updated 4 months ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆24Updated 8 months ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- ☆12Updated 2 years ago
- ☆15Updated 2 months ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆12Updated 2 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆18Updated 2 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 3 months ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated last year
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆19Updated 6 months ago
- Continuous kerberoast monitor☆43Updated last year
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆4Updated 6 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆27Updated last year
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆18Updated last year
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆13Updated 2 years ago
- A fast wordlist to nthash converter☆21Updated 2 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆14Updated 2 years ago
- Smuggle a file to a user's browser☆18Updated 2 years ago