cedowens / keygrabber
Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can lead to.
☆16Updated 3 years ago
Alternatives and similar repositories for keygrabber:
Users that are interested in keygrabber are comparing it to the libraries listed below
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- ☆13Updated 3 years ago
- ☆18Updated last year
- ☆11Updated 6 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- module for certexfil☆15Updated 2 years ago
- leaking net-ntlm with webdav☆24Updated 4 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆14Updated 3 years ago
- ☆24Updated 4 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆13Updated 2 years ago
- SSDP Service Discovery☆16Updated 6 years ago
- Serving files with conditions, serverside keying and more.☆17Updated 2 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- ☆12Updated 4 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆17Updated last year
- ☆17Updated 4 years ago
- ☆15Updated last year
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆22Updated 3 years ago
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- ☆12Updated 2 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆13Updated 10 months ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 2 years ago