Decrypt passwords stored in VNC files
☆75Aug 26, 2022Updated 3 years ago
Alternatives and similar repositories for VNCDecrypt
Users that are interested in VNCDecrypt are comparing it to the libraries listed below
Sorting:
- Handy Stored Password Decryption Techniques☆164Jun 9, 2021Updated 4 years ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆17Jul 3, 2025Updated 8 months ago
- ☆16Dec 7, 2025Updated 3 months ago
- A simple index for HackTheBox machine along with tags☆16Jan 8, 2026Updated 2 months ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- Fortigate password recovery☆18Feb 5, 2018Updated 8 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- This is a repository containing code to generate a PowerShell payload to access PCs remotely. For more information check this out 👇👇👇☆16Mar 17, 2022Updated 4 years ago
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆437Jul 29, 2013Updated 12 years ago
- Juicy Potato for x86 Windows☆130Oct 12, 2019Updated 6 years ago
- PowerShell SOCKS proxy with reverse proxy capabilities☆84Apr 23, 2021Updated 4 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆982Jan 29, 2023Updated 3 years ago
- Malicious Macro Generator for LibreOffice/OpenOffice☆70Jan 11, 2023Updated 3 years ago
- Retrieve host information from NTLM☆32Feb 4, 2021Updated 5 years ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆74Sep 11, 2024Updated last year
- generate payloads that force authentication against an attacker machine☆120Nov 6, 2022Updated 3 years ago
- Interract with Microsoft SQL Server (MS SQL | MSSQL) servers and their linked instances in restricted environments, without the need for …☆54Mar 11, 2026Updated last week
- evilginx2 + gophish☆14Sep 8, 2022Updated 3 years ago
- Generate users list using certain format☆23Jan 23, 2019Updated 7 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,209Jan 5, 2026Updated 2 months ago
- A tool to recommend available exploits for Windows Operating Systems☆59Apr 16, 2021Updated 4 years ago
- SeManageVolumePrivilege to SYSTEM☆150Nov 22, 2023Updated 2 years ago
- This is just a super sloppy and personalized quick guide for obsidian in obsidian for classmates and friends, it's by no means official o…☆18May 16, 2023Updated 2 years ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- Script to extract the cached credentials from SSSD, getting Active Directory credentials from Unix systems☆24Jun 14, 2023Updated 2 years ago
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure …☆2,805Mar 16, 2026Updated last week
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- CVE-2018-9276 PRTG < 18.2.39 Reverse Shell (Python3 support)☆20Dec 22, 2022Updated 3 years ago
- Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled.☆208Sep 25, 2018Updated 7 years ago
- ☆53Jun 28, 2025Updated 8 months ago
- 蓝凌OA漏洞利用工具/前台无条件RCE/文件写入☆28Jun 29, 2021Updated 4 years ago
- A browser based visualization of domain trusts. Give it a csv, get a pretty diagram to play with!☆19Jun 16, 2019Updated 6 years ago
- Build Alpine Linux images for LXD☆204Jul 10, 2025Updated 8 months ago
- Detect and extract the static part of a glob string.☆10Mar 22, 2022Updated 4 years ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,063Jan 22, 2026Updated 2 months ago
- ☆17Sep 30, 2020Updated 5 years ago
- Yet Another CTF Playbook☆25Jul 29, 2025Updated 7 months ago
- cmd tools for AWD☆14Jun 10, 2023Updated 2 years ago
- Simple forward and reverse shells that can be compiled and used on pen tests to avoid AV and used to get better access.☆29Feb 6, 2013Updated 13 years ago