byt3n33dl3 / NetExecLinks
The Network Relay Execution Tool.
โ17Updated 11 months ago
Alternatives and similar repositories for NetExec
Users that are interested in NetExec are comparing it to the libraries listed below
Sorting:
- Enterprise level of Parallelization SSH (Concurrency), Logon Penetration Testing.โ26Updated 9 months ago
- ๐ฌ๐๐ฅ๐ for offensive, YARA can do that!?โ11Updated last year
- Prevent users from accessing online services. Distributed Denied of Service Attack server that cuts off targets or surrounding Infrastrucโฆโ10Updated last year
- Docker Payloads (Bypass) Data at the endpoint when running NestJS APK.โ17Updated last year
- For radio frequency research severe damage to privacy or modify wireless devices.โ16Updated 11 months ago
- Weaponizing Nim, with the elegance of modern logic programming language. Nim can do that!?โ12Updated last year
- MFA and 2FA chainers, authentication PenTesting frameworks.โ19Updated last year
- WPA frequency sessions, framworks of customs firmware and intensity of RF.โ13Updated last year
- Offshore the Maze Octopus for Remote Admin Access.โ27Updated last year
- Kerberos Attacks by cracking the system or router that provides a gateway for Active Directory.โ20Updated last year
- The most advanced Mach-O binary malware for macOS or Unix-based distro.โ43Updated 11 months ago
- A swiss army Knife for Penetration testing Networks and Active Directory.โ45Updated 8 months ago
- Combining "Authentication" to convey on Active Directory. Advanced Kerberos attacks.โ15Updated last year
- Password hash decryption utilities, fastest and most advanced password cracking. Supports hundreds of hash & cipher types, runs on many oโฆโ48Updated last year
- Kerberos Attacks From Networks or Domain controller log Perspective through HMAC in exchanges.โ30Updated last year
- Seven Degrees of Domain Adminโ84Updated 10 months ago
- BloodHound Attack Research Kit. BARK is an Attack Kit for Attack path Management.โ13Updated last year
- An Open source Pentesting Software for Mapping Injection points to Takeover.โ53Updated 10 months ago
- Backdoor for Rubella on Shell'sโ32Updated last year
- Automated Exploit scanners for public Camera, CCTV's, and Capture Devices.โ22Updated 11 months ago
- Sharp and GPO abuse for PrivEsc, Data Collector for BloodHound and BlackMarlinExec.โ105Updated 4 months ago
- Ronin the Shogun for XSS and XSRF bug-hunting.โ14Updated 11 months ago
- yarn BHCE, Six Degrees of Domain Admin. Using Neo4j to store Networks objects and relationships as graph nodes and edges, enabling path-fโฆโ55Updated 6 months ago
- Ticket harvesting frameworks for kerberos pentesting.โ43Updated 11 months ago
- ๐ฐ๐ช WannaCry ๐ฅ๐ฎ๐ป๐๐ผ๐บ๐๐ฎ๐ฟ๐ฒ. This malware spread by using a vulnerability Exploit Called "EternalBlue".โ58Updated last year
- Github Profile Readmeโ36Updated 4 months ago
- Six Degrees of Enterprise Domain Adminโ27Updated 3 months ago
- Configurations and Deprecated payloads. Some useful scripts for Cobaltstrike.โ17Updated last year
- Nikto the Alienware, scanning for misconfigurations and Information disclosures on WebApp.โ17Updated last year
- rootkit and kernel pentesting for Linux, most advanced malware for SUID.โ10Updated last year