WellKnitTech / LockBitPanelDBLinks
Repo of the SQL database from the LockBit panel being hacked.
☆31Updated 9 months ago
Alternatives and similar repositories for LockBitPanelDB
Users that are interested in LockBitPanelDB are comparing it to the libraries listed below
Sorting:
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆42Updated last year
- self-hosted Azure OSINT tool☆32Updated 7 months ago
- A user enumeration tool for Slack.☆35Updated last year
- ☆56Updated last year
- create a "simulated internet" cyber range environment☆19Updated last week
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆126Updated last month
- Automatically deploy Nemesis☆21Updated last year
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆91Updated 6 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated 2 years ago
- ☆33Updated 2 years ago
- Detonate malware on VMs and get logs & detection status☆76Updated last week
- ☆35Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Updated 4 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆64Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆44Updated last year
- CVE-2013-4786 Go exploitation tool☆40Updated 2 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆35Updated 2 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated 2 years ago
- Covert data exfiltration via DNS☆51Updated 11 months ago
- 💎 Vulnerability assessment and vulnerability intelligence tool searching for vulnerabilities and exploits using keywords across multiple…☆36Updated 2 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆55Updated last month
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Updated 3 weeks ago
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆46Updated 7 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆57Updated last year
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Updated 2 months ago