SySS-Research / clone-certLinks
Simple shell script to "clone" X.509 certificates
☆108Updated 4 months ago
Alternatives and similar repositories for clone-cert
Users that are interested in clone-cert are comparing it to the libraries listed below
Sorting:
- Automated 802.1x Bypass☆85Updated 5 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆33Updated 8 years ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- Pre-compiled tools to tunnel TCP over RDP Connections☆87Updated 6 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- Enumerate RIDs using pure Python☆32Updated last year
- Scripts and results for finding domain frontable CloudFront domains☆54Updated 7 years ago
- Responder for Python3☆100Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- Create a screenshot of a remote desktop because NLA is disabled.☆39Updated 3 years ago
- Password list collected from Cisco devices☆19Updated 6 years ago
- Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE☆57Updated 5 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆104Updated 6 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- A fork of openssh-portable for penetration testing purposes.☆11Updated 7 years ago
- A minimal DNS service that can provide spoofed replies☆103Updated 2 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Updated 3 years ago
- ☆51Updated 5 years ago
- A tool to generate a custom code signing certificate chain and generate instructions to sign a binary. Useful for establishing persistenc…☆112Updated 9 years ago
- Ye olde root shell for ye olde httpd☆44Updated 10 years ago
- This is a bash script to bypass 802.1x NAC☆100Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆43Updated 5 years ago
- Sustainable shellcode evasion☆109Updated 7 months ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆66Updated 5 years ago
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 6 years ago
- ☆38Updated 5 years ago
- Pypykatz agent implemented in .NET☆85Updated 6 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- Samba, NFS shares spider and grepper☆71Updated 7 years ago