fkasler / dolos_cloakLinks
Automated 802.1x Bypass
☆85Updated 5 years ago
Alternatives and similar repositories for dolos_cloak
Users that are interested in dolos_cloak are comparing it to the libraries listed below
Sorting:
- AvBuster The stress Tester for your Anti Malware solutions☆41Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Samba, NFS shares spider and grepper☆71Updated 7 years ago
- Automatically spin up infra for phishing☆64Updated 5 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆80Updated 4 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆39Updated 5 years ago
- Enumerate RIDs using pure Python☆32Updated last year
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 7 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- ☆128Updated 2 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆53Updated 2 years ago
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆107Updated 6 years ago
- Impacket is a collection of Python classes for working with network protocols.☆17Updated 5 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Updated 8 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆32Updated 6 years ago
- ☆99Updated 6 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆33Updated 8 years ago
- Fully-featured spear-phishing toolkit - web front-end☆52Updated 8 months ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆110Updated 10 months ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- ☆110Updated 7 years ago
- Methods of C2☆21Updated 10 years ago
- Example VBA Macro for MacOS Mojave☆66Updated 6 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated last year