☆14Jun 26, 2020Updated 5 years ago
Alternatives and similar repositories for mimikatz-bypass
Users that are interested in mimikatz-bypass are comparing it to the libraries listed below
Sorting:
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago
- A Flutter + Firebase App to make Assignments sharing easier☆13Nov 19, 2020Updated 5 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- Pwnage☆17Jul 1, 2025Updated 8 months ago
- ☆42Apr 20, 2018Updated 7 years ago
- Powershell / C# based cross platform forensic framework based for live incident response☆23Jul 5, 2020Updated 5 years ago
- A powershell script for cracking halfLMchall password hashes☆22Feb 5, 2013Updated 13 years ago
- HTTP request smuggling tools☆18Aug 17, 2020Updated 5 years ago
- Offensive penetration testing. Perform multiple attack types against web applications, vulnerable programs and OSes in predefined and saf…☆26Aug 14, 2020Updated 5 years ago
- Simple development DNS server written in python☆26Dec 19, 2017Updated 8 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- OAuth plugin for Burp Suite Extender☆43Jun 27, 2018Updated 7 years ago
- Quick and dirty script to check for No RL☆31Feb 18, 2025Updated last year
- Webapp to search tips on Twitter through #bugbountytips☆72Dec 2, 2022Updated 3 years ago
- A program to map out SPF and DKIM records for a large number of domains☆39Apr 1, 2015Updated 10 years ago
- An offensive Powershell console☆30Dec 5, 2015Updated 10 years ago
- Import Recommended Firewall Rules from vRNI to VMware Cloud on AWS or NSX-T☆10Feb 3, 2022Updated 4 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Small modification version of p0wnedShell☆40Apr 25, 2016Updated 9 years ago
- MAGENTO implementation - CARD Processing @mobilPay☆11Updated this week
- Parses Facebook chat messages into Python objects to enable convenient analysis.☆11Jan 3, 2018Updated 8 years ago
- ☆38Aug 12, 2020Updated 5 years ago
- a Burp Extender that add an random X-Forward-For IP address for each request☆31Aug 12, 2016Updated 9 years ago
- Conveigh is a Windows PowerShell LLMNR/NBNS spoofer detection tool☆97Aug 28, 2016Updated 9 years ago
- WigleAPI-JSON in PHP with JSON Response☆14Nov 18, 2013Updated 12 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆17Feb 20, 2026Updated 2 weeks ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Singer.io tap for extracting data from the Slack Web API☆11Dec 18, 2025Updated 2 months ago
- The behavioural indexer for Ethereum.☆13Jun 13, 2024Updated last year
- Build your own threat hunting maturity model☆11Oct 29, 2017Updated 8 years ago
- 基于upx的SM4加密壳☆10May 12, 2023Updated 2 years ago
- Proof of concept to test POODLE over TLS☆11Mar 13, 2015Updated 10 years ago
- notes on applied computer security☆12Jun 27, 2023Updated 2 years ago