Simple shell script to "clone" X.509 certificates
☆116Mar 31, 2025Updated 11 months ago
Alternatives and similar repositories for clone-cert
Users that are interested in clone-cert are comparing it to the libraries listed below
Sorting:
- Gets in the way of your victim's traffic and out of yours☆27Aug 4, 2019Updated 6 years ago
- LDAP Swiss Army Knife☆51Dec 5, 2023Updated 2 years ago
- A simple script to make network namespaces more usable☆22Oct 18, 2019Updated 6 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,449Nov 20, 2025Updated 3 months ago
- ☆11Dec 18, 2018Updated 7 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- Keystroke injection tool collection for 2.4 GHz wireless input devices☆24Oct 20, 2023Updated 2 years ago
- jnlpdownloader is a Python script that takes a URL to a JNLP and downloads all the associated JARs and native libraries. Another Java ba…☆14Aug 16, 2021Updated 4 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Mar 24, 2017Updated 8 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Software tools for Nordic Semiconductor nRF24-based devices like wireless keyboards, mice, and presenters☆94Jun 1, 2017Updated 8 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆37Feb 6, 2026Updated last month
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆21Sep 26, 2016Updated 9 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Nov 23, 2022Updated 3 years ago
- WireBug is a toolset for Voice-over-IP penetration testing☆174Mar 30, 2022Updated 3 years ago
- ☆198Mar 19, 2020Updated 5 years ago
- outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) a…☆126Sep 19, 2017Updated 8 years ago
- ☆98Feb 21, 2019Updated 7 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Jul 5, 2022Updated 3 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated last year
- ☆13Feb 25, 2023Updated 3 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- A basic proxylogon scanner☆27Aug 11, 2021Updated 4 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- DLL Password Filter Implant with Exfiltration Capabilities☆138Feb 24, 2020Updated 6 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Aug 8, 2022Updated 3 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Apr 10, 2019Updated 6 years ago
- CoffeeShot: Avoid Detection with Memory Injection☆77Aug 6, 2018Updated 7 years ago
- Create a stream from one or more memory regions.☆12Jan 22, 2024Updated 2 years ago
- Shellcode Loader | xss.is☆13Jul 26, 2024Updated last year
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- ☠️ Python script and example file to test the Right-To-Left Override attack☆10Feb 25, 2019Updated 7 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Oct 7, 2020Updated 5 years ago