A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.
☆46Feb 27, 2024Updated 2 years ago
Alternatives and similar repositories for Talon
Users that are interested in Talon are comparing it to the libraries listed below
Sorting:
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 2 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆104Dec 15, 2022Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆132May 12, 2023Updated 2 years ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆13Jan 9, 2024Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆20Nov 13, 2025Updated 4 months ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆20Dec 16, 2025Updated 3 months ago
- ☆11Dec 8, 2023Updated 2 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆444Aug 18, 2023Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆31Jun 27, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆365Jul 20, 2023Updated 2 years ago
- Yet Another LinkedIn Scraper☆33Mar 9, 2023Updated 3 years ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆28Dec 19, 2025Updated 3 months ago
- Efflanrs - GUI for Snaffler Output☆26Sep 13, 2024Updated last year
- ☆12Oct 10, 2024Updated last year
- Dump document encryption password from Office process memory☆40Mar 27, 2023Updated 2 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Havoc plugin allowing in-memory execution of PowerShell cmdlets☆13Dec 14, 2023Updated 2 years ago
- kerberos in rust for fun and profit☆66Mar 13, 2026Updated last week
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- Convert ldapdomaindump to Bloodhound☆80Dec 19, 2023Updated 2 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- MODBUS Penetration Testing Framework☆12Jul 2, 2017Updated 8 years ago
- Retired TrustedSec Capabilities☆250Jan 5, 2026Updated 2 months ago
- A PowerShell script that simplifies life and therefore... phishing.☆20Aug 16, 2022Updated 3 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- A collection of various exploits☆29Sep 17, 2024Updated last year
- ☆14Dec 24, 2025Updated 2 months ago
- Retrieves jobs based off criteria submitted and also returns median salary for software engineers for the hiring company.☆21Jan 27, 2026Updated last month
- MimeCast Password Spraying Tool☆47Oct 30, 2019Updated 6 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Jul 16, 2025Updated 8 months ago
- Find Inbound Email Domains☆34Dec 21, 2023Updated 2 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆898Mar 11, 2026Updated last week
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- A BOF/COFF loader implemented in Go and CGO.☆23Jan 16, 2024Updated 2 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- a port of privkit bof for havoc☆23Dec 8, 2023Updated 2 years ago