blackhatethicalhacking / ruler
A tool to abuse Exchange services
☆18Updated 5 years ago
Related projects: ⓘ
- A Tool for Domain Flyovers☆18Updated 4 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Updated 5 years ago
- The New Hacking Framework☆18Updated 7 years ago
- Comfy & powerful Red Team Infrastructure deployement using Docker☆13Updated 4 years ago
- operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links wi…☆13Updated 4 years ago
- Automated Penetration Testing Framework☆35Updated 5 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- ☆11Updated 3 years ago
- A toolkit to attack Office365☆16Updated 5 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆28Updated 4 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Updated 5 years ago
- Password spraying script and helper for creating password lists☆33Updated 4 years ago
- Where I'll be posting my scripts, guides, cheatsheets, and notes for for my OSCP journey.☆31Updated 6 years ago
- A collection of scripts from around the web to be used with OSCP☆11Updated 7 years ago
- PowerShell Pass The Hash Utils☆16Updated 5 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆35Updated 5 years ago
- ☆19Updated this week
- ☆12Updated this week
- Tool for dictionary attack with fail2ban bypass.☆10Updated 6 years ago
- ☆21Updated 7 years ago
- Report and finding templates used by the Serpico reporting tool☆15Updated 5 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆42Updated 3 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Updated 4 years ago
- ☆13Updated this week
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆27Updated 5 years ago
- scripts to setup environments for red/blue teams.☆16Updated 9 months ago
- Personal blog about security, exploitation, CTFs, ...☆21Updated 5 years ago
- Extract credentials from lsass remotely☆16Updated 4 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆34Updated 4 years ago
- ☆48Updated this week