croustibaie / CredSSPYView external linksLinks
Man in the middle for NLA enabled RDP in python
☆15Nov 26, 2021Updated 4 years ago
Alternatives and similar repositories for CredSSPY
Users that are interested in CredSSPY are comparing it to the libraries listed below
Sorting:
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- CVE-2021-39685 Description and sample exploit for Linux USB Gadget overflow vulnerability☆14Apr 28, 2022Updated 3 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- AD Live changes viewer☆36Feb 25, 2023Updated 2 years ago
- Asus AsIO2 Local Privilege Escalation exploit (based on ReWolf's MSI exploit)☆14Apr 5, 2020Updated 5 years ago
- ☆21Jun 3, 2021Updated 4 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Détection d'anomalie à partir des journaux d'authentification Windows☆18Apr 16, 2021Updated 4 years ago
- ☆18Aug 4, 2020Updated 5 years ago
- RCE in NPM VSCode Extension☆20Apr 11, 2021Updated 4 years ago
- Méthode de Sensibilisation à la Sécurité Informatique pour un public Néophyte☆17Jun 17, 2015Updated 10 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Sep 25, 2020Updated 5 years ago
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- Serious Scavenger Hunt is a free, open source web applicaiton for building, running and managing great scavenger hunts.☆18Sep 10, 2024Updated last year
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆25Feb 8, 2022Updated 4 years ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆55Jul 8, 2022Updated 3 years ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆49Nov 2, 2021Updated 4 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- An eBPF detection program for CVE-2022-0847☆29Jul 5, 2022Updated 3 years ago
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Oct 8, 2020Updated 5 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Configuration security audit framework☆21Apr 27, 2016Updated 9 years ago
- A beginner-friendly CTF about Kubernetes security.☆81Aug 9, 2022Updated 3 years ago
- Repository for Insomni'hack finals 2015☆22Mar 30, 2015Updated 10 years ago
- Telco training☆26Oct 17, 2018Updated 7 years ago
- ☆31Sep 23, 2022Updated 3 years ago
- Lists of AMSI triggers (VBA, JScript / VBScript)☆33Jun 28, 2019Updated 6 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆41Jan 14, 2026Updated last month
- ☆11Updated this week
- Change up a binary's embedded resources with this little creature.☆36Mar 24, 2020Updated 5 years ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Aug 7, 2024Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆36Apr 5, 2022Updated 3 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated last week
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 7 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- Tools for offensive security of NetBackup infrastructures☆43Jun 6, 2023Updated 2 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Updated this week
- An IDA processor for eBPF bytecode☆34May 17, 2017Updated 8 years ago