Wh1t3Fox / polenumView external linksLinks
Uses Core's Impacket Library to get the password policy from a windows machine
☆42Mar 1, 2025Updated 11 months ago
Alternatives and similar repositories for polenum
Users that are interested in polenum are comparing it to the libraries listed below
Sorting:
- game of active directory (SnapLabs version)☆15Aug 12, 2025Updated 6 months ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.☆24Jul 26, 2017Updated 8 years ago
- ☆10Oct 12, 2021Updated 4 years ago
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- ☆14Jan 25, 2022Updated 4 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆12Jul 10, 2021Updated 4 years ago
- Qakbot Registry Key Configuration Decryptor☆14Dec 20, 2021Updated 4 years ago
- :e-mail: Enumerate usernames through SMTP service☆17Jun 30, 2019Updated 6 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Templates for developing your own listeners and agents for AdaptixC2.☆44Feb 3, 2026Updated 2 weeks ago
- pyCryptoCat - A CryptoCat standalone python client.☆35Dec 22, 2013Updated 12 years ago
- Enumerate RIDs using pure Python☆32Jan 5, 2026Updated last month
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆18Nov 28, 2013Updated 12 years ago
- Windows eventlog formatting, live fetching and querying utility in C☆20May 26, 2020Updated 5 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- ohrwurm is an RTP fuzzer. features some SIP parsing and RTCP suppressing.☆17Sep 30, 2010Updated 15 years ago
- Crack the verification hash of the encrypted payload of the Gauss Virus☆20Dec 25, 2021Updated 4 years ago
- Scans an internal network using massscan and nmap☆19Nov 21, 2025Updated 2 months ago
- From Patch to PoC☆28Nov 19, 2025Updated 2 months ago
- Easy 802.1Q VLAN Hopping☆390Feb 24, 2016Updated 9 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Jun 5, 2017Updated 8 years ago
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Aug 19, 2019Updated 6 years ago
- mixed packet injector tool☆20Dec 29, 2020Updated 5 years ago
- Clone of PDFiD by Didier Stevens, as a package and with some improvements.☆52May 27, 2016Updated 9 years ago
- Cymothoa is a backdooring tool, that inject backdoor's shellcode directly into running applications. Stealth and lightweight...☆18Aug 24, 2015Updated 10 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- ☆28Feb 11, 2016Updated 10 years ago
- Merge multiple nMap xml files into one☆49May 5, 2019Updated 6 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆32Jun 23, 2019Updated 6 years ago
- A Bayesian Method for the Induction of Probalistic Networks from Data☆19Jul 6, 2017Updated 8 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 5 years ago
- FTester - firewall and IDS testing tool [historical]☆24Aug 2, 2017Updated 8 years ago
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆23Mar 20, 2023Updated 2 years ago
- Dump objects from .NET dumps.☆51Apr 19, 2022Updated 3 years ago
- Zone transfers for rwhois☆20Feb 27, 2019Updated 6 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- Twitter Words of Interest - Generate word lists from twitter searches☆31Nov 10, 2022Updated 3 years ago