PowerShell Pass The Hash Utils
☆16Dec 9, 2018Updated 7 years ago
Alternatives and similar repositories for Invoke-TheHash
Users that are interested in Invoke-TheHash are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool for dictionary attack with fail2ban bypass.☆10May 17, 2018Updated 7 years ago
- A tool to abuse Exchange services☆18Jun 21, 2019Updated 6 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆28Nov 3, 2018Updated 7 years ago
- A Tool for Domain Flyovers☆18Nov 12, 2019Updated 6 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆28Jul 11, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆14Jan 18, 2019Updated 7 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Jun 13, 2019Updated 6 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆49Jul 30, 2019Updated 6 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Nov 10, 2019Updated 6 years ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆31Nov 8, 2018Updated 7 years ago
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- Automated Penetration Testing Framework☆35Mar 22, 2019Updated 7 years ago
- VoIPmonitor sniffer sources☆20Nov 14, 2019Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Extract credentials from lsass remotely☆16Jan 3, 2020Updated 6 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Aug 14, 2019Updated 6 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆15Dec 10, 2019Updated 6 years ago
- ☆12Dec 10, 2020Updated 5 years ago
- Comfy & powerful Red Team Infrastructure deployement using Docker☆13Oct 29, 2019Updated 6 years ago
- Trace ScriptBlock execution for powershell v2☆40Jan 14, 2020Updated 6 years ago
- Tutorial Dasar Codeigniter☆13Oct 3, 2019Updated 6 years ago
- PoC for extracting office files into PDF file metadata☆11Sep 11, 2019Updated 6 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A simple, clean status viewer for Minecraft networks☆24Feb 1, 2016Updated 10 years ago
- This repo provides bite-sized samples, blog posts, demos, and helpful tips on Azure Bicep implementation techniques and templates. Please…☆39Nov 13, 2025Updated 4 months ago
- Small script to use PIR sensor for motion estimation on motionEye☆12May 29, 2020Updated 5 years ago
- Microsoft Health PowerShell Module☆19Jan 28, 2016Updated 10 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- Modules created by Nettitude for Metasploit☆11Jun 20, 2018Updated 7 years ago
- Plugins and signatures☆13Jun 11, 2019Updated 6 years ago
- Quick start for Errbot on Windows with PowerShell Integration☆17Jul 9, 2021Updated 4 years ago
- My take on the Win10 Task Cleaner UAC bypass.☆19Mar 14, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- PowerShell implementation of OpenAI and Other Providers☆21Jun 2, 2023Updated 2 years ago
- Use DNS to hunt for threats including DGAs☆15Jan 4, 2016Updated 10 years ago
- Networking and attacking scripts.☆10Apr 20, 2017Updated 8 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆41Oct 29, 2024Updated last year
- Quick & Dirty DFIR scripts developed by Ebryx DFIR team to keep handy during field assignment☆14Jan 7, 2026Updated 3 months ago
- A collection of open source and commercial tools that aid in red team operations.☆10Jun 12, 2019Updated 6 years ago