fkasler / dolos_cloakLinks
Automated 802.1x Bypass
☆86Updated 5 years ago
Alternatives and similar repositories for dolos_cloak
Users that are interested in dolos_cloak are comparing it to the libraries listed below
Sorting:
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆106Updated 6 years ago
- Samba, NFS shares spider and grepper☆71Updated 7 years ago
- Enumerate RIDs using pure Python☆33Updated last year
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- ☆128Updated 2 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆41Updated 4 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆39Updated 5 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 6 years ago
- Impacket is a collection of Python classes for working with network protocols.☆17Updated 5 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- ☆98Updated 6 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆111Updated last year
- Tool for password spraying RDP☆98Updated 7 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆80Updated 4 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆93Updated 6 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆53Updated 2 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 3 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Updated 4 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Updated 3 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆33Updated 8 years ago
- AWS S3 Bucket/Object Finder☆25Updated 8 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- DeepSea Phishing Gear☆124Updated 5 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Updated 8 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- Updated version of C2K☆51Updated 7 years ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Updated 7 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆46Updated 3 years ago
- Fully-featured spear-phishing toolkit - web front-end☆52Updated 10 months ago