ShutdownRepo / GeoWordlists
GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.
☆10Updated last year
Alternatives and similar repositories for GeoWordlists:
Users that are interested in GeoWordlists are comparing it to the libraries listed below
- ☆17Updated last year
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 10 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Simple reverse ICMP shell☆13Updated 9 months ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Updated 11 months ago
- Ansible role that Installs Mythic☆14Updated 7 months ago
- ☆12Updated 2 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- Nemesis agent for Mythic☆26Updated 5 months ago
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 3 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆13Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆17Updated 4 years ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆16Updated 3 weeks ago
- Python3 tool to perform password spraying using RDP☆16Updated last year
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 10 months ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆11Updated last month
- string encryption in Nim☆17Updated 8 months ago
- ☆2Updated 2 months ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- A simple to use single-include Windows API resolver☆20Updated 7 months ago
- Modified version of PEAS client for offensive operations☆38Updated 2 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆11Updated 3 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 7 months ago
- Scripts to interact with Microsoft Graph APIs☆33Updated 3 months ago