byt3n33dl3 / BreedHoundAD
Data and exploit collector for SharpHound to BloodHound. This software will automatically determine what domain or directory the current user belongs to. ( BOF.NET )
☆75Updated last month
Related projects: ⓘ
- Seven Degrees of Domain Admin☆55Updated this week
- Teeth - smilodon cybertooth is a password decryption utilities for online services & offline hashes, fastest and most advanced password c…☆34Updated 2 months ago
- Kerberos Attacks, obtaining password hashes. 𝗖𝗿𝗮𝗰𝗸𝗠𝗼𝗽𝗘𝘅𝗲𝗰 focuses on the acquisition of TGS, specifically those related to se…☆30Updated last week
- 𓆰𓆪 WannaCry 𝗥𝗮𝗻𝘀𝗼𝗺𝘄𝗮𝗿𝗲. This malware spread by using a vulnerability exploit called 'EternalBlue'. The US National Security A…☆38Updated 4 months ago
- Perform a ( hard-core ) force attack to get the correct credentials in under one minute, with the help of 𝗧𝗲𝗲𝘁𝗵 cybertooth && 𝗝𝗼𝗵…☆50Updated 2 months ago
- Six Degrees of Domain Admin☆28Updated last week
- Github Profile Readme☆18Updated this week
- Kerberoasting ( Kerberos Attacks ). From networks or Domain controller log perspective, since 𝗖𝗿𝗮𝗰𝗞𝗲𝗿𝗕𝗹𝗶𝘁𝘇 implements many pa…☆23Updated 2 months ago
- This malware is often used to form Botnets, enabling initial access for the Cyber Attacks Ransomware or Ryuk banking Trojan. 7R0J4N is de…☆27Updated 4 months ago
- Enhance swiss army knife, for penetration testing networks. Kerberos attacks and passwords spraying. Additionally, a database is used to …☆19Updated last week
- Docker Payload ( Bypass anti virus ). Payload data at the endpoint when running NestJS application inside a Docker container.☆15Updated 2 months ago
- Three headed dog, Kerberos Attacks. Cracking the system or router that provides a gateway for Active Directory.☆17Updated 4 months ago
- offshore is the most brutal and advance host hunter, ready and steady for rubella ( 7R0J4N ) trojan infections to be spreaded. Bypass sev…☆16Updated 2 months ago
- Hook ( grab ) a frequency sessions, a bundle of customs firmware. A high intensity of the RF environment will also likely make this attac…☆11Updated 2 months ago
- Automatic Injection attacks. Blind SQL, NoSQL, SQL, Blind GQL, GQL, Command, LDAP, Traversal, JNDI, JDBC, Esi, El, Etc. Clear mapping.☆30Updated 3 weeks ago
- Release Neo, the Evil Ducky scripts into any Hardware or drive and watch that Devices burn.☆9Updated 2 months ago
- ( Cracking Authentication ) this software will help you to pentesting a services and attempts to exploit the authentication process. a we…☆13Updated 2 months ago
- P O I S O N I N G☆15Updated 2 months ago
- encrypting directory and access. If the attackers find a 'scripts' that execute the commands based on external inputs, they might exploit…☆10Updated 2 months ago
- Rootkit and Kernel attack kit, 𝗜𝘀𝗮𝗯𝗲𝗹𝗹𝗮 program will enables cyber attacks to gain access to and infiltrate data from machines wi…☆8Updated 2 months ago
- Pegasus, the spyware that represents a significant threat to privacy and security, showcasing the capabilities of modern surveillance tec…☆12Updated 3 months ago
- configurations and deprecated payloads☆10Updated 2 months ago
- Versatile tool for BloodHound, an attack research kit in my own version and modification☆10Updated 4 months ago
- Combining 'authentication' and 'grilling' to convey. Active directory ( trust attack ). performing an advance Kerberos attack may result …☆12Updated 3 months ago
- Abusive & Offensive ( 7R0J4N ) remote access for any smartphones, most advance on Android. crowdown is software that gives a person full …☆16Updated last month
- remote access trojan, RAT tools for penetration testing on a devices, access real time with client devices after the malware hits the ker…☆10Updated 2 months ago
- Advance web scanner. It is designed to identify various security vulnerabilities in web applications by scanning for misconfigurations, i…☆13Updated 2 months ago
- TheFatRat : Remote control Access Devices and exploiting tool, used as a deadly Backdoor generator that bypass most anti virus software. …☆43Updated 2 months ago
- 𝗖𝗿𝗮𝘅𝘀𝗥𝗮𝘁 is a Notorious Smartphones Malware family, known for its Remote Administration & Access Tools, which include remote Devi…☆56Updated last month
- Updated o365 Evilginx phishlet for WHfB☆12Updated 6 months ago