c3llkn1ght / BlindBruteView external linksLinks
A blind SQL injection brute forcer
☆113Apr 25, 2025Updated 9 months ago
Alternatives and similar repositories for BlindBrute
Users that are interested in BlindBrute are comparing it to the libraries listed below
Sorting:
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- ☆17Jan 9, 2025Updated last year
- ☆15Jan 26, 2023Updated 3 years ago
- ☆19Dec 18, 2024Updated last year
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- Collection of BOFs for Cobalt Strike☆33Mar 28, 2023Updated 2 years ago
- A VSCode plugin to assist with BOF development.☆37Aug 14, 2024Updated last year
- ☆20Nov 5, 2025Updated 3 months ago
- Repo hacks☆21Dec 7, 2025Updated 2 months ago
- C# loader that copies a chunk at the time of the shellcode in memory, rather that all at once☆23Jul 14, 2022Updated 3 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- ☆16May 15, 2021Updated 4 years ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆50Feb 13, 2025Updated last year
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated 11 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆45Apr 27, 2025Updated 9 months ago
- ☆37Jun 9, 2021Updated 4 years ago
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 4 months ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- Easy peasy file uploads☆33Aug 29, 2025Updated 5 months ago
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆61Aug 18, 2025Updated 5 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- dump Chrome cookies remotely with atexec and CDP☆68Aug 10, 2024Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated 11 months ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆53Dec 12, 2025Updated 2 months ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆40Dec 2, 2025Updated 2 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆235Feb 6, 2025Updated last year
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆15Sep 10, 2024Updated last year
- ☆16Dec 7, 2025Updated 2 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Sample Random GitHub Repositories☆11Dec 27, 2025Updated last month
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- ☆10Jun 26, 2024Updated last year