PowerShell module to play with Kerberos S4U extensions
☆23Sep 14, 2017Updated 8 years ago
Alternatives and similar repositories for Mystique
Users that are interested in Mystique are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Nov 23, 2021Updated 4 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆15Jul 7, 2021Updated 4 years ago
- Detect and abuse risky SPNs☆267Jun 15, 2017Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Oct 18, 2019Updated 6 years ago
- Theat hunting notes in flat file format and mapped to MITRE's ATT&CK IDs☆43Oct 21, 2018Updated 7 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- Set of ultra technical notes about AD☆18Jun 17, 2018Updated 7 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Jul 4, 2022Updated 3 years ago
- Official Black Hat Arsenal Security Tools Repository☆21Jul 31, 2017Updated 8 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- ☆11Apr 23, 2019Updated 6 years ago
- Linkedin Tools (and maybe later other source) to reconstruct a company hierarchy from scraping relations and jobs title☆16Aug 4, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Python api for usage with cobalt strike's External C2 specification☆64Nov 6, 2018Updated 7 years ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- Script for Enumerating SaaS offerings of a specific domain through DNS queries☆50Dec 7, 2022Updated 3 years ago
- ☆98Mar 16, 2016Updated 10 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆36Dec 1, 2025Updated 3 months ago
- Veil-Evasion is a tool used to generate payloads that bypass antivirus solutions☆12Apr 24, 2017Updated 8 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 4 years ago
- Alphanumeric Encoder☆25Oct 10, 2018Updated 7 years ago
- Multi-threaded socks proxy checker written in Go!☆45Jan 3, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 4 months ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- Switch to JuicyPotato! https://github.com/decoder-it/juicy-potato☆12Feb 8, 2020Updated 6 years ago
- Visual Studio Code extension for MITRE ATT&CK☆56Jul 3, 2024Updated last year
- ☆65Feb 12, 2026Updated last month
- Enumerate domain machine accounts and perform pre2k password spraying.☆69Jul 14, 2023Updated 2 years ago
- ☆10Oct 29, 2019Updated 6 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- Simple translation from godoc to markdown.☆13Jun 28, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Man in the middle for NLA enabled RDP in python☆15Nov 26, 2021Updated 4 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- Rumble Network Discovery API☆17May 16, 2024Updated last year
- CIDR to IP List Tool☆14Mar 12, 2016Updated 10 years ago
- A script for generating custom passphrase lists to be used for password cracking with hashcat rules☆81Jun 27, 2018Updated 7 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆37Aug 30, 2018Updated 7 years ago