ThoughtfulDev / CME-BruteForcer
A little Python Script for cracking Windows Passwords with the help of CrackMapExec
☆35Updated 7 years ago
Alternatives and similar repositories for CME-BruteForcer
Users that are interested in CME-BruteForcer are comparing it to the libraries listed below
Sorting:
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23Updated 7 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆57Updated last year
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 6 years ago
- Social Engineering Toys☆36Updated 9 years ago
- Android and iOS source for the Empire mobile app☆89Updated 6 years ago
- PowerShell script to retreive wifi ESSIDs and Passwords.☆26Updated 7 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 5 months ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 8 years ago
- ☆52Updated 11 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆83Updated 4 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 6 years ago
- Wiki to collect Red Team infrastructure hardening resources☆20Updated 6 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 10 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆35Updated 5 years ago
- Specify targets and run sets of tools against them☆11Updated 10 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- A ctypes powered python keylogger.☆106Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago