SySS-Research / clone-certLinks
Simple shell script to "clone" X.509 certificates
☆111Updated 8 months ago
Alternatives and similar repositories for clone-cert
Users that are interested in clone-cert are comparing it to the libraries listed below
Sorting:
- Automated 802.1x Bypass☆86Updated 5 years ago
- Scripts and results for finding domain frontable CloudFront domains☆54Updated 7 years ago
- A minimal DNS service that can provide spoofed replies☆102Updated 2 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 8 years ago
- ☆52Updated 6 years ago
- Pre-compiled tools to tunnel TCP over RDP Connections☆88Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Responder for Python3☆100Updated 6 years ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Updated 3 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Updated 9 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 8 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Updated 4 years ago
- Creates dictionaries based on Wikipedia titles☆62Updated 6 years ago
- Sustainable shellcode evasion☆112Updated last year
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- Ye olde root shell for ye olde httpd☆44Updated 10 years ago
- Windows Share Enumerator☆130Updated 7 years ago
- Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms☆102Updated 6 years ago
- A fork of openssh-portable for penetration testing purposes.☆11Updated 7 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- Socks5 server over Websockets☆40Updated 7 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 6 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆112Updated last year
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 6 years ago
- LDAP Swiss Army Knife☆50Updated 2 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆106Updated 6 years ago
- ☆73Updated last year
- Enumerate RIDs using pure Python☆32Updated last year