dariusztytko / token-reverserView external linksLinks
Words list generator to crack security tokens
☆110May 20, 2020Updated 5 years ago
Alternatives and similar repositories for token-reverser
Users that are interested in token-reverser are comparing it to the libraries listed below
Sorting:
- Burp Suite extension to track vulnerability assessment progress☆59Mar 7, 2020Updated 5 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆91May 10, 2020Updated 5 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- ☆103May 5, 2020Updated 5 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Sep 2, 2020Updated 5 years ago
- GO sandbox to run untrusted code☆42Jan 17, 2020Updated 6 years ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆18May 17, 2020Updated 5 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- Everything you need about Burp Extension Generation☆157Jan 6, 2023Updated 3 years ago
- Selenium based web scraper to generate passwords list☆51May 7, 2020Updated 5 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- Extract (links/possible endpoints) from responses & filter them via decoding/sorting☆93Aug 27, 2019Updated 6 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆781Jun 20, 2020Updated 5 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆43Apr 27, 2020Updated 5 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆504Sep 23, 2025Updated 4 months ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.☆86May 6, 2023Updated 2 years ago
- A tool written in python for scraping firebase data☆43Apr 5, 2020Updated 5 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆277Jan 28, 2025Updated last year
- Tool aided persistence via Windows URI schemes abuse☆84Mar 1, 2020Updated 5 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆610Aug 15, 2025Updated 5 months ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆542Apr 14, 2021Updated 4 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆157Dec 8, 2022Updated 3 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Jul 24, 2020Updated 5 years ago
- ☆173Jan 26, 2023Updated 3 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- ☆49Jul 14, 2020Updated 5 years ago
- Scripts to help with different ffuf tasks and workflows☆223Dec 24, 2023Updated 2 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 5 years ago
- You can read the writeup on this script here☆274Jul 12, 2020Updated 5 years ago
- FockCache - Minimalized Test Cache Poisoning☆111Feb 3, 2020Updated 6 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- Linux Local Privesc Helper and Agent☆166Dec 2, 2019Updated 6 years ago
- Scan Victim Backup Directories & Backup Files☆182Sep 25, 2023Updated 2 years ago
- Suite of programs meant to aid in bug hunting and security assessments☆79Dec 29, 2019Updated 6 years ago
- A golang utility to spider through a website searching for additional links.☆343Nov 7, 2020Updated 5 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆205Nov 8, 2020Updated 5 years ago
- A tool to automate the boring process of APK recon☆346Sep 30, 2022Updated 3 years ago