chris408 / junkins
A script to automate Jenkins credential store decryption
☆17Updated 6 years ago
Alternatives and similar repositories for junkins:
Users that are interested in junkins are comparing it to the libraries listed below
- Hostile Dropboxes Management☆26Updated 5 years ago
- Certificate Export Utility☆26Updated 4 years ago
- Zone transfers for rwhois☆20Updated 5 years ago
- ☆30Updated 6 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- Office 365 MFA capture toolkit☆12Updated 7 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆18Updated 9 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 5 years ago
- Mimikatz HashClash☆12Updated 9 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- ☆25Updated 3 years ago
- ☆11Updated 8 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 6 years ago
- CVE-2017-8570 Exploit☆21Updated 7 years ago
- Socks5 server over Websockets☆40Updated 6 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated 3 months ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆22Updated 8 years ago
- AV Bypass☆29Updated 7 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago
- Crawl certificate information from censys☆8Updated 8 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- EmPyre Web Interface☆12Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- Windows Privesc Check☆20Updated 10 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago