byt3n33dl3 / CorporalKrakenLinks
Docker Payloads (Bypass) Data at the endpoint when running NestJS APK.
☆17Updated last year
Alternatives and similar repositories for CorporalKraken
Users that are interested in CorporalKraken are comparing it to the libraries listed below
Sorting:
- Kerberos Attacks From Networks or Domain controller log Perspective through HMAC in exchanges.☆30Updated last year
- Password hash decryption utilities, fastest and most advanced password cracking. Supports hundreds of hash & cipher types, runs on many o…☆48Updated last year
- Weaponizing Nim, with the elegance of modern logic programming language. Nim can do that!?☆12Updated last year
- A swiss army Knife for Penetration testing Networks and Active Directory.☆44Updated 9 months ago
- MFA and 2FA chainers, authentication PenTesting frameworks.☆19Updated last year
- Offshore for LLMNR/NBT-NS Poisoning and abuse for PrivEsc.☆27Updated last year
- Kerberos Attacks by cracking the system or router that provides a gateway for Active Directory.☆20Updated last year
- Playing with WPA frequency sessions framworks, check-lists of customs firmware and intensity of RF.☆13Updated last year
- Seven Degrees of Domain Admin☆84Updated 11 months ago
- Encrypting directory and access. Execute the commands based on external inputs RCE, single-C2 and key-logging.☆11Updated last year
- Prevent users from accessing online services. Distributed Denied of Service Attack server that cuts off targets or surrounding Infrastruc…☆10Updated last year
- An Open source Pentesting Software for Mapping Injection points to Takeover.☆53Updated 11 months ago
- YARA for offensive, YARA can do that!?☆11Updated last year
- Active Directory kerberos attack framworks.☆43Updated last year
- Yarn BHCE by using Neo4j to store Networks objects and relationships as graph nodes and edges, enabling attack path discovery.☆55Updated 8 months ago
- rootkit and kernel pentesting for Linux, most advanced malware for SUID.☆10Updated last year
- BloodHound Attack Research Kit. BARK is an Attack Kit for Attack path Management.☆13Updated last year
- Internal malware and data collector for BloodHound and BlackMarlinExec pathway PrivEsc mapping strategies.☆106Updated 6 months ago
- WiFi Pentesting on Mac filters bypass and SSID manipulation.☆21Updated last year
- worlds most advanced GUI applications for C2 and remote-access, based on trojan's malware.☆11Updated 5 months ago
- Github Profile Readme (https://byt3n33dl3.substack.com/)☆36Updated 6 months ago
- Backdoor for Rubella on Shell's☆32Updated last year
- Release Neo the Evil-Ducky, a scripts for rubber-ducky USB.☆12Updated last year
- 🗝 BotNet ( .NET ) Source Codes☆14Updated last year
- Support CobaltStrike kit for File System (NTFS/NPFS) Minifilter Drivers error handling.☆17Updated last year
- Enterprise level of Parallelization SSH (Concurrency), Logon Penetration Testing.☆26Updated 10 months ago
- Six Degrees of Enterprise Domain Admin☆27Updated 4 months ago
- Nikto the Alienware, scanning for misconfigurations and Information disclosures on WebApp.☆17Updated last year
- Radio frequency cybersecurity architech research, based on latest severe damage to privacy or modify wireless devices.☆16Updated last year
- 🔱 Ronin the Shogun, WebApp parameter analysis and fuzzer for XSS and SSRF.☆14Updated last year