A C project that generates usernames based on input lists and format you decide yourself
☆11Jan 23, 2025Updated last year
Alternatives and similar repositories for usernamecrafter
Users that are interested in usernamecrafter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆49Apr 9, 2025Updated 11 months ago
- Token impersonation in PowerShell to execute under the context of another user.☆24Oct 14, 2025Updated 5 months ago
- Creating them Golden Tickets☆14Aug 16, 2025Updated 7 months ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆17Feb 19, 2023Updated 3 years ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆61Apr 13, 2025Updated 11 months ago
- results of scraping OneDrive from February 2022 - March 2025☆27Apr 29, 2025Updated 10 months ago
- Repo hacks☆21Dec 7, 2025Updated 3 months ago
- Client-side Encrypted Upload Server Python Script☆67Jul 10, 2025Updated 8 months ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- ☆27Feb 3, 2026Updated last month
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆237Sep 3, 2023Updated 2 years ago
- Enumerate domain machine accounts and perform pre2k password spraying.☆69Jul 14, 2023Updated 2 years ago
- A tool to query for the existence of pre-windows 2000 computer objects.☆374Dec 23, 2025Updated 2 months ago
- ☆39Feb 26, 2025Updated last year
- An offensive toolkit for restless guests #DEFCON33☆53Aug 11, 2025Updated 7 months ago
- Exploits Unauth Docker API☆43Apr 18, 2025Updated 11 months ago
- ☆13Feb 18, 2024Updated 2 years ago
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆51Dec 7, 2025Updated 3 months ago
- POC tool to abuse windows server failover clusters☆55Aug 7, 2025Updated 7 months ago
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆27Nov 23, 2025Updated 3 months ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 9 months ago
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago
- ☆88Jul 28, 2022Updated 3 years ago
- Data Brokers Information and Out-Out Links☆17Apr 12, 2024Updated last year
- ☆28Updated this week
- ☆41Feb 20, 2025Updated last year
- Fast memory tree storage structure for PHP☆11Oct 28, 2015Updated 10 years ago
- A list of various eye- and head-tracking software, products, etc. ℹ️ This is just a push-mirror. We develop here: https://codeberg.org/ey…☆19Aug 28, 2025Updated 6 months ago
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 4 months ago
- ☆15May 9, 2023Updated 2 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆259Mar 2, 2026Updated 3 weeks ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 9 years ago
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆13May 23, 2024Updated last year
- Azure administrative tiering based on known attack paths☆134Mar 14, 2026Updated last week
- Collection of tools to use with Azure Applications☆113Oct 13, 2023Updated 2 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆93Mar 12, 2026Updated last week
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year