byt3n33dl3 / BrutalHookExec
Hooking frequency Sessions, a bundle of customs firmware and intensity of RF.
☆14Updated 6 months ago
Alternatives and similar repositories for BrutalHookExec:
Users that are interested in BrutalHookExec are comparing it to the libraries listed below
- (Cracking Authentication) Attacking a Services and attempts to exploit the MFA processes.☆19Updated 6 months ago
- BloodHound Attack Research Kit. BARK is an Attack Kit for Attack path Management.☆13Updated 8 months ago
- Combining "Authentication" to convey on Active Directory. Advanced Kerberos attacks.☆16Updated 7 months ago
- Kerberos Attacks From Networks or Domain controller log Perspective through HMAC in exchanges.☆30Updated 7 months ago
- Docker Payloads (Bypass) Data at the endpoint when running NestJS APK.☆17Updated 7 months ago
- Prevent users from accessing online services. Distributed Denied of Service Attack server that cuts off targets or surrounding Infrastruc…☆11Updated 7 months ago
- Configurations and Deprecated payloads. Some useful scripts for Cobaltstrike.☆17Updated 6 months ago
- Weaponizing Nim, with the elegance of modern logic programming language. Nim can do that!?☆13Updated 7 months ago
- Kerberos Attacks by cracking the system or router that provides a gateway for Active Directory.☆20Updated 8 months ago
- Nikto the Alienware : Advance web scanner, Identify by scanning for Misconfigurations and Information disclosures.☆18Updated 6 months ago
- Release Neo the Evil Ducky, A scripts into any Hardware or drive Devices.☆12Updated 6 months ago
- Offshore the Maze Octopus for Remote Admin Access.☆24Updated 6 months ago
- Six Degrees of Domain Admin☆46Updated 4 months ago
- P O I S O N I N G☆19Updated 6 months ago
- A swiss army Knife for Penetration testing Networks and Active Directory.☆38Updated 3 weeks ago
- Rootkit and Kernel attack kit, 𝗜𝘀𝗮𝗯𝗲𝗹𝗹𝗮 program Enables Cyber Attacks to gain access from Machines without being detected.☆11Updated 6 months ago
- Encrypting directory and access. Execute the Commands Based on external inputs RCE.☆12Updated 6 months ago
- Teeth - smilodon cybertooth is a password decryption utilities for online services & offline hashes, fastest and most advanced password c…☆45Updated 6 months ago
- Github Profile Readme☆32Updated this week
- For radio frequency research severe damage to privacy or modify wireless devices.☆18Updated 4 months ago
- Backdoor for Rubella on Shell's☆32Updated 8 months ago
- Kerberos Attacks. EXECTRINITY focuses on the acquisition of TGS. Specifically operating under Active Directory.☆43Updated 4 months ago
- Ronin the Shogun for XSS and XSRF Attacks.☆16Updated 4 months ago
- Remote access Trojan based (Client) After the Malware hits the Kernel.☆12Updated 6 months ago
- Enterprise level of Parallelization SSH (Concurrency), Logon Penetration Testing.☆23Updated 2 months ago
- Six Degrees of Enterprise Domain Admin☆23Updated 3 weeks ago
- Worm roulette, a Miscellaneous tools for Gambllers. Don't do it guys☆9Updated 6 months ago
- 𓆰𓆪 WannaCry 𝗥𝗮𝗻𝘀𝗼𝗺𝘄𝗮𝗿𝗲. This malware spread by using a vulnerability Exploit Called "EternalBlue".☆46Updated 8 months ago
- 𝗬𝗔𝗥𝗔 for offensive, YARA can do that!?☆11Updated 6 months ago
- 🗝 BotNet ( .NET ) Source Codes☆14Updated 8 months ago