byt3n33dl3 / .crackedauthLinks
MFA and 2FA chainers, authentication PenTesting frameworks.
β19Updated last year
Alternatives and similar repositories for .crackedauth
Users that are interested in .crackedauth are comparing it to the libraries listed below
Sorting:
- Kerberos Attacks From Networks or Domain controller log Perspective through HMAC in exchanges.β30Updated last year
- π¬ππ₯π for offensive, YARA can do that!?β11Updated last year
- WPA frequency sessions, framworks of customs firmware and intensity of RF.β13Updated last year
- Password hash decryption utilities, fastest and most advanced password cracking. Supports hundreds of hash & cipher types, runs on many oβ¦β48Updated last year
- BloodHound Attack Research Kit. BARK is an Attack Kit for Attack path Management.β13Updated last year
- Docker Payloads (Bypass) Data at the endpoint when running NestJS APK.β17Updated last year
- Offshore the Maze Octopus for Remote Admin Access.β27Updated last year
- Kerberos Attacks by cracking the system or router that provides a gateway for Active Directory.β20Updated last year
- A swiss army Knife for Penetration testing Networks and Active Directory.β45Updated 8 months ago
- Configurations and Deprecated payloads. Some useful scripts for Cobaltstrike.β17Updated last year
- Sharp and GPO abuse for PrivEsc, Data Collector for BloodHound and BlackMarlinExec.β106Updated 5 months ago
- Seven Degrees of Domain Adminβ84Updated 10 months ago
- yarn BHCE, Six Degrees of Domain Admin. Using Neo4j to store Networks objects and relationships as graph nodes and edges, enabling path-fβ¦β55Updated 7 months ago
- An Open source Pentesting Software for Mapping Injection points to Takeover.β53Updated 10 months ago
- Prevent users from accessing online services. Distributed Denied of Service Attack server that cuts off targets or surrounding Infrastrucβ¦β10Updated last year
- Nikto the Alienware, scanning for misconfigurations and Information disclosures on WebApp.β17Updated last year
- Ticket harvesting frameworks for kerberos pentesting.β43Updated last year
- Encrypting directory and access. Execute the Commands Based on external inputs RCE.β11Updated last year
- Release Neo the Evil Ducky, A scripts into any Hardware or drive Devices.β12Updated last year
- Github Profile Readmeβ36Updated 5 months ago
- Weaponizing Nim, with the elegance of modern logic programming language. Nim can do that!?β12Updated last year
- rootkit and kernel pentesting for Linux, most advanced malware for SUID.β10Updated last year
- P O I S O N I N Gβ21Updated last year
- Backdoor for Rubella on Shell'sβ32Updated last year
- For radio frequency research severe damage to privacy or modify wireless devices.β16Updated last year
- Attacking Assimilation-bridge by looping with SNMPv3 & GPG, usingas CPUs, FPGAs cycles: 0x989, most advanced password and logon recovery.β85Updated 10 months ago
- Remote access Trojan based (Client) After the Malware hits the Kernel.β12Updated last year
- π BotNet ( .NET ) Source Codesβ14Updated last year
- Ronin the shogun for XSS and SSRF on WebApp.β14Updated last year
- Enterprise level of Parallelization SSH (Concurrency), Logon Penetration Testing.β26Updated 10 months ago