evilsocket / legba-cookbookLinks
Legba recipes.
☆50Updated 10 months ago
Alternatives and similar repositories for legba-cookbook
Users that are interested in legba-cookbook are comparing it to the libraries listed below
Sorting:
- Script to perform some hashcracking logic automagically☆72Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 2 years ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆42Updated 6 months ago
- ☆28Updated last year
- Password Transformation Tool (ptt) is a versatile utility designed for password cracking.☆28Updated last week
- A script to automate keystrokes through a graphical desktop program.☆35Updated last month
- Top hashpwn rules☆19Updated 7 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- masscan with exclusive excludes☆57Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 9 months ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆17Updated this week
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 10 months ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Rubber Ducky powered by NeoKey☆25Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Updated 4 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- Gadget IoC removal from HAK5's BashBunny☆20Updated last year
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last month
- Fast website scraper and wordlist generator☆81Updated 2 months ago
- Enumeration & fingerprint tool☆25Updated last year
- hashgen - the blazingly fast hash generator☆33Updated last week
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Various scripts & tools☆12Updated last year
- ☆77Updated last year
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago