coj337 / TheSprayerLinks
TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locking out accounts.
☆37Updated 2 months ago
Alternatives and similar repositories for TheSprayer
Users that are interested in TheSprayer are comparing it to the libraries listed below
Sorting:
- Google Meet Phishing Template For Gophish☆48Updated 3 years ago
- ☆47Updated 3 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- OSCP Study Guide☆42Updated 3 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Updated last year
- Resources for AD penetration testing and security☆33Updated 3 years ago
- ☆90Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆113Updated 4 months ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 3 years ago
- Super organized and flexible script for sending phishing campaigns☆56Updated 4 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- A little cheatsheet for NetExec☆32Updated last year
- ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an int…☆46Updated last week
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 3 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Updated 3 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- ☆31Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Updated 2 years ago
- ☆24Updated 11 months ago
- A Red Teaming tool focused on profiling the target.☆29Updated 3 weeks ago
- Tools used for Pentesting☆22Updated 2 years ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆23Updated 3 years ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆56Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year