ch33kyf3ll0w / Ora-PwnLinks
Oracle Attacks Tool
☆13Updated 8 years ago
Alternatives and similar repositories for Ora-Pwn
Users that are interested in Ora-Pwn are comparing it to the libraries listed below
Sorting:
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 6 years ago
- Custom scripts released for BSidesDC 2016☆14Updated 8 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Mimikatz HashClash☆12Updated 10 years ago
- ☆11Updated 9 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆61Updated 7 years ago
- ☆19Updated 8 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Mainframe bruter and screen automation utility.☆20Updated 3 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- ☆30Updated 6 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Updated 10 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆39Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Scripts for automating actions in Cobalt Strike☆11Updated 8 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆31Updated 8 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 10 years ago
- ☆25Updated 6 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Updated 11 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 10 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 4 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆45Updated 8 years ago