PowerShell Pass The Hash Utils
☆16Dec 9, 2018Updated 7 years ago
Alternatives and similar repositories for Invoke-TheHash
Users that are interested in Invoke-TheHash are comparing it to the libraries listed below
Sorting:
- Tool for dictionary attack with fail2ban bypass.☆10May 17, 2018Updated 7 years ago
- A tool to abuse Exchange services☆18Jun 21, 2019Updated 6 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆28Nov 3, 2018Updated 7 years ago
- Abusing Certificate Transparency logs for getting HTTPS websites subdomains.☆28Mar 2, 2019Updated 7 years ago
- A Tool for Domain Flyovers☆18Nov 12, 2019Updated 6 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆28Jul 11, 2019Updated 6 years ago
- operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links wi…☆13Oct 23, 2019Updated 6 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆14Jan 18, 2019Updated 7 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Jun 13, 2019Updated 6 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆49Jul 30, 2019Updated 6 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Nov 10, 2019Updated 6 years ago
- The New Hacking Framework☆18Apr 26, 2017Updated 8 years ago
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- Automated Penetration Testing Framework☆35Mar 22, 2019Updated 7 years ago
- An automated e-mail OSINT tool☆23Apr 23, 2022Updated 3 years ago
- VoIPmonitor sniffer sources☆20Nov 14, 2019Updated 6 years ago
- Extract credentials from lsass remotely☆16Jan 3, 2020Updated 6 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Aug 14, 2019Updated 6 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆15Dec 10, 2019Updated 6 years ago
- ☆12Dec 10, 2020Updated 5 years ago
- Comfy & powerful Red Team Infrastructure deployement using Docker☆13Oct 29, 2019Updated 6 years ago
- Powershell Module Template with GitHub, PowerShellGallery and AppVeyor.☆13Oct 7, 2019Updated 6 years ago
- Tutorial Dasar Codeigniter☆13Oct 3, 2019Updated 6 years ago
- A simple, clean status viewer for Minecraft networks☆24Feb 1, 2016Updated 10 years ago
- This repo provides bite-sized samples, blog posts, demos, and helpful tips on Azure Bicep implementation techniques and templates. Please…☆39Nov 13, 2025Updated 4 months ago
- Automatically exported from code.google.com/p/windbgshark☆12Nov 3, 2015Updated 10 years ago
- Microsoft Health PowerShell Module☆19Jan 28, 2016Updated 10 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- Modules created by Nettitude for Metasploit☆11Jun 20, 2018Updated 7 years ago
- Repository to host scripts discussed in https://www.notsosecure.com/crafting-way-json-web-tokens/☆15Aug 4, 2018Updated 7 years ago
- Plugins and signatures☆13Jun 11, 2019Updated 6 years ago
- Quick start for Errbot on Windows with PowerShell Integration☆17Jul 9, 2021Updated 4 years ago
- My take on the Win10 Task Cleaner UAC bypass.☆19Mar 14, 2019Updated 7 years ago
- PowerShell implementation of OpenAI and Other Providers☆21Jun 2, 2023Updated 2 years ago
- Use DNS to hunt for threats including DGAs☆15Jan 4, 2016Updated 10 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆41Oct 29, 2024Updated last year
- Quick & Dirty DFIR scripts developed by Ebryx DFIR team to keep handy during field assignment☆14Jan 7, 2026Updated 2 months ago
- A collection of open source and commercial tools that aid in red team operations.☆10Jun 12, 2019Updated 6 years ago