ThoughtfulDev / CME-BruteForcer
A little Python Script for cracking Windows Passwords with the help of CrackMapExec
☆33Updated 7 years ago
Alternatives and similar repositories for CME-BruteForcer:
Users that are interested in CME-BruteForcer are comparing it to the libraries listed below
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆83Updated 6 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆55Updated 6 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 9 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆57Updated last year
- ☆52Updated 11 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆55Updated 5 years ago
- PowerShell script to retreive wifi ESSIDs and Passwords.☆26Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Specify targets and run sets of tools against them☆11Updated 9 years ago
- Massive arsenal of hacker tools...☆77Updated 7 years ago
- Bash Bunny fun!☆52Updated 6 years ago
- Social Engineering Toys☆36Updated 9 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago
- collection of pentest tools☆24Updated 5 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆94Updated 4 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Useful pentesting scripts☆83Updated last month
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Converts a command to a base64 powershell compatible string☆26Updated 10 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Updated 8 years ago
- Search public IP owner through ARIN☆56Updated last year
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 7 years ago
- Custom stagers with python encrypting proxy☆39Updated 9 years ago