☆43Nov 21, 2024Updated last year
Alternatives and similar repositories for PynAuth
Users that are interested in PynAuth are comparing it to the libraries listed below
Sorting:
- 365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.☆570Mar 6, 2026Updated 2 weeks ago
- A tool to attack ARP☆15May 27, 2021Updated 4 years ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆36Jan 11, 2026Updated 2 months ago
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- ☆20Jan 10, 2025Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Sep 4, 2024Updated last year
- JavaScript for Automation (JXA) macOS agent☆95Feb 19, 2026Updated last month
- ☆15Jun 27, 2024Updated last year
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- ☆10Sep 24, 2021Updated 4 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆271Sep 14, 2023Updated 2 years ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- ☆14Jan 8, 2026Updated 2 months ago
- ☆189Nov 21, 2024Updated last year
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆398Feb 9, 2026Updated last month
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 3 months ago
- ☆26Nov 25, 2025Updated 3 months ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,261Jul 22, 2025Updated 8 months ago
- ☆29Aug 24, 2025Updated 6 months ago
- malleable profile generator GUI for Havoc☆55Apr 28, 2023Updated 2 years ago
- Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]☆27Jun 3, 2024Updated last year
- ☆16Oct 30, 2022Updated 3 years ago
- Wordpress Plugins List☆24Jun 17, 2019Updated 6 years ago
- ☆15May 26, 2021Updated 4 years ago
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 5 years ago
- ☆14Mar 19, 2024Updated 2 years ago
- List web account manager (WAM) accounts added to the current profile☆24Dec 11, 2025Updated 3 months ago
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆155Jul 12, 2023Updated 2 years ago
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- ☆53Oct 20, 2020Updated 5 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- Command Augmentation support for BOFs and .NET assemblies across agents☆42Updated this week