byt3n33dl3 / RoninLinks
π± Ronin the Shogun, WebApp parameter analysis and fuzzer for XSS and SSRF.
β14Updated last year
Alternatives and similar repositories for Ronin
Users that are interested in Ronin are comparing it to the libraries listed below
Sorting:
- Active Directory kerberos attack framworks.β43Updated last year
- Github Profile Readme (https://byt3n33dl3.substack.com/)β36Updated 6 months ago
- Internal malware and data collector for BloodHound and BlackMarlinExec pathway PrivEsc mapping strategies.β106Updated 6 months ago
- Yarn BHCE by using Neo4j to store Networks objects and relationships as graph nodes and edges, enabling attack path discovery.β55Updated 8 months ago
- A swiss army Knife for Penetration testing Networks and Active Directory.β44Updated 9 months ago
- Support CobaltStrike kit for File System (NTFS/NPFS) Minifilter Drivers error handling.β17Updated last year
- Six Degrees of Enterprise Domain Adminβ27Updated 4 months ago
- Seven Degrees of Domain Adminβ84Updated 11 months ago
- Offshore for LLMNR/NBT-NS Poisoning and abuse for PrivEsc.β27Updated last year
- Encrypting directory and access. Execute the commands based on external inputs RCE, single-C2 and key-logging.β11Updated last year
- WiFi Pentesting on Mac filters bypass and SSID manipulation.β21Updated last year
- Password hash decryption utilities, fastest and most advanced password cracking. Supports hundreds of hash & cipher types, runs on many oβ¦β48Updated last year
- Backdoor for Rubella on Shell'sβ32Updated last year
- Kerberos Attacks From Networks or Domain controller log Perspective through HMAC in exchanges.β30Updated last year
- rootkit and kernel pentesting for Linux, most advanced malware for SUID.β10Updated last year
- An Open source Pentesting Software for Mapping Injection points to Takeover.β53Updated 11 months ago
- Nikto the Alienware, scanning for misconfigurations and Information disclosures on WebApp.β17Updated last year
- Docker Payloads (Bypass) Data at the endpoint when running NestJS APK.β17Updated last year
- worlds most advanced GUI applications for C2 and remote-access, based on trojan's malware.β11Updated 5 months ago
- MFA and 2FA chainers, authentication PenTesting frameworks.β19Updated last year
- Kerberos Attacks by cracking the system or router that provides a gateway for Active Directory.β20Updated last year
- Enterprise level of Parallelization SSH (Concurrency), Logon Penetration Testing.β26Updated 10 months ago
- Radio frequency cybersecurity architech research, based on latest severe damage to privacy or modify wireless devices.β16Updated last year
- Crawler malware through SMB share or LDAP queries, (require Administrator access for DCSync atttack).β12Updated last year
- π BotNet ( .NET ) Source Codesβ14Updated last year
- Prevent users from accessing online services. Distributed Denied of Service Attack server that cuts off targets or surrounding Infrastrucβ¦β10Updated last year
- YARA for offensive, YARA can do that!?β11Updated last year
- Weaponizing Nim, with the elegance of modern logic programming language. Nim can do that!?β12Updated last year
- Playing with WPA frequency sessions framworks, check-lists of customs firmware and intensity of RF.β13Updated last year
- Release Neo the Evil-Ducky, a scripts for rubber-ducky USB.β12Updated last year