Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can lead to.
☆17May 7, 2021Updated 4 years ago
Alternatives and similar repositories for keygrabber
Users that are interested in keygrabber are comparing it to the libraries listed below
Sorting:
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 5 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- Adds extensibility to Burp by using a list of payloads to pattern match on HTTP responses highlighting interesting and potentially vulner…☆15Aug 4, 2023Updated 2 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆22Sep 27, 2020Updated 5 years ago
- Some Python tooling to for example try to decrypt CyberArk .cred credential files☆60Apr 29, 2023Updated 2 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 2 months ago
- Username lists that I created.☆17Aug 9, 2021Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- PowerShell script that decrypts password entries from a Passwordstate server.☆26Feb 17, 2026Updated last week
- Tool to analyze a lot of APK files☆20Feb 21, 2026Updated last week
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Dec 2, 2021Updated 4 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Password manager credential recovery tool☆20Feb 20, 2019Updated 7 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆57Jun 2, 2024Updated last year
- Salesforce object access auditor☆118Jan 30, 2023Updated 3 years ago
- ☆27Mar 5, 2023Updated 2 years ago
- POC for DLL Proxying / Hijacking☆63May 26, 2025Updated 9 months ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆28Aug 8, 2022Updated 3 years ago
- nuke that event log using some epic dinvoke fu☆118May 12, 2021Updated 4 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Aug 8, 2017Updated 8 years ago
- Metasploit module for massive Denial of Service using #Bluekeep vector.☆25Oct 1, 2019Updated 6 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Dec 29, 2016Updated 9 years ago
- avarehelper☆12Aug 15, 2021Updated 4 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- POC from TestANull for CVE-2021-28482 on Exchange Server☆46May 3, 2021Updated 4 years ago
- Cuda Miner for BeamHash (Equihash 150,5)☆13Jan 16, 2019Updated 7 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Hide code from dnSpy and other C# spying tools☆42Oct 18, 2020Updated 5 years ago
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly☆90Sep 30, 2024Updated last year
- The 9esim mini tool is a external (or we called extension) LPA on a board, which based on ESP32S3.☆13Dec 19, 2024Updated last year
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 8 months ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- A public repo to hold some code review challenges for RSA Conference 2022☆11Jun 3, 2022Updated 3 years ago