ZerkerEOD / krakenhashesLinks
☆340Updated this week
Alternatives and similar repositories for krakenhashes
Users that are interested in krakenhashes are comparing it to the libraries listed below
Sorting:
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆215Updated last month
- Extracts browser-stored data such as refresh tokens, cookies, saved credentials, credit cards, autofill entries, browsing history, and bo…☆367Updated last week
- Enhance Your Active Directory Password Spraying with User Intelligence.☆311Updated last month
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆223Updated 9 months ago
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆258Updated 2 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆130Updated 10 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆191Updated last year
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆275Updated 2 weeks ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆129Updated 10 months ago
- A real fake social engineering app☆130Updated 6 months ago
- PowerShell Obfuscator☆226Updated 5 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆208Updated 4 months ago
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆431Updated 2 months ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 4 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- evilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).☆303Updated 2 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆157Updated 7 months ago
- Everything and anything related to password spraying☆151Updated last year
- A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.☆148Updated 2 weeks ago
- ☆79Updated 9 months ago
- ☆75Updated last year
- Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence☆417Updated 2 months ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆167Updated 7 months ago
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆229Updated this week
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆120Updated 4 months ago
- A collection of config files for linux focusing on hackthebox theme☆53Updated 3 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆264Updated 8 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆175Updated 8 months ago
- Prompts for performing tests on your Kali Linux using Gemini-cli, ChatGPT, DeepSeek, CursorAI, Claude Code, and Copilot.☆203Updated last month
- Our Tips&Tricks☆128Updated 11 months ago