SySS-Research / ldap-swakLinks
LDAP Swiss Army Knife
☆49Updated last year
Alternatives and similar repositories for ldap-swak
Users that are interested in ldap-swak are comparing it to the libraries listed below
Sorting:
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- c# reverse shell poc☆27Updated 6 years ago
- ☆58Updated 2 years ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆26Updated 2 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated last month
- ☆54Updated 4 years ago
- A little implant which SSH's back with a shell☆38Updated 3 years ago
- pyForgeCert is a Python equivalent of the ForgeCert.☆69Updated 2 years ago
- Service Enumeration C# .NET Assembly☆58Updated 3 years ago
- A web shell for pivoting and lateral movement☆34Updated 7 years ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- A tool to password spray Jenkins instances☆57Updated 6 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Updated 4 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆63Updated 5 years ago
- C# POC code for the SessionEnv dll hijack by utilizing called functions of TSMSISrv.dll☆60Updated 6 years ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- ☆37Updated 7 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 3 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆112Updated 2 years ago
- Router socks. One port socks for all the others.☆69Updated last year
- ☆53Updated 4 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24Updated 3 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆43Updated 5 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆107Updated 6 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Updated 4 years ago
- Mara is a userland pty/tty sniffer☆53Updated last year
- Execute Mimikatz with different technique☆51Updated 3 years ago
- Privilege escalation using dmidecode☆20Updated 6 years ago