cheeseandcereal / fake-rdpLinks
Emulate the handshake packets of an RDP server with python
☆15Updated 7 years ago
Alternatives and similar repositories for fake-rdp
Users that are interested in fake-rdp are comparing it to the libraries listed below
Sorting:
- Free Email Providers☆11Updated 2 years ago
- post exploitation user monitoring tool☆20Updated 7 years ago
- ☆17Updated 5 years ago
- Kibana app for RedELK☆18Updated 2 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Updated 6 years ago
- ☆19Updated 5 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆58Updated 2 years ago
- Experimenting with destructive file attacks in Go☆19Updated 6 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 6 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Updated 5 years ago
- DNS logging, detection, ...☆15Updated 3 years ago
- A redteam tool to obfuscate IPv4 addresses to evade AV or Application Firewalls☆18Updated 5 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago
- Log converter from CS log to Ghostwriter CSV☆31Updated 5 years ago
- ☆18Updated 2 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆22Updated 2 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Updated 6 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Updated 6 years ago
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆16Updated 3 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Updated 3 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Updated last year
- ☆24Updated 5 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆63Updated 7 years ago