Unit-259 / dataBouncingLinks
☆21Updated 8 months ago
Alternatives and similar repositories for dataBouncing
Users that are interested in dataBouncing are comparing it to the libraries listed below
Sorting:
- A powershell module for hiding payloads in the pixels of images☆79Updated last year
- Password spraying tool for Microsoft Online accounts (Entra/Azure/O365)☆63Updated last year
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆119Updated 10 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 4 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆128Updated 7 months ago
- Vast.ai Password Kracking☆89Updated 3 weeks ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆114Updated 4 months ago
- ☆144Updated last month
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆132Updated 3 months ago
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆216Updated 2 weeks ago
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆55Updated 8 months ago
- ☆118Updated 5 months ago
- This tool exploits Golden DMSA attack against delegated Managed Service Accounts.☆86Updated 4 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 9 months ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Updated last week
- IPSpinner works as a local proxy that redirects requests through external services.☆106Updated 8 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆150Updated 3 months ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆83Updated 6 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆179Updated 6 months ago
- PoC that downloads an executable from a public SSL certificate☆131Updated 3 months ago
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆65Updated 8 months ago
- ☆92Updated 10 months ago
- Living off the land searches for explorer and sharepoint☆91Updated 6 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆79Updated last year
- Utilities for obfuscating shellcode☆95Updated 2 months ago
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆56Updated 4 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆107Updated 8 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆86Updated 2 months ago
- Continuous password spraying tool☆195Updated 3 weeks ago