f0cker / pypal
Python port of Pipal for password analytics
☆22Updated 11 months ago
Related projects: ⓘ
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆24Updated 2 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 4 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 4 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- ☆19Updated this week
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 3 years ago
- ☆18Updated 4 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆13Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆15Updated 4 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 2 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆28Updated 6 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆77Updated 3 years ago
- A simple program to query nmap xml files in the terminal.☆26Updated 4 years ago
- Modified version of PEAS client for offensive operations☆38Updated last year
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Updated 6 years ago
- automatic scan for hackthebox☆14Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆17Updated 3 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆16Updated 3 years ago
- ☆14Updated this week
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆41Updated last year
- Active Directory information dumper via LDAP☆11Updated 4 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆22Updated 10 years ago
- Automatically spin up infra for phishing☆64Updated 4 years ago
- ☆16Updated 7 years ago
- ☆23Updated 4 years ago
- Wireless Pentesting Device☆17Updated 4 years ago
- ☆33Updated 6 years ago