floyd-fuh / JKS-private-key-cracker-hashcatView external linksLinks
Nail in the JKS coffin - Cracking passwords of private key entries in a JKS file
☆189Sep 21, 2020Updated 5 years ago
Alternatives and similar repositories for JKS-private-key-cracker-hashcat
Users that are interested in JKS-private-key-cracker-hashcat are comparing it to the libraries listed below
Sorting:
- UUID issues for Burp Suite☆53Jun 2, 2022Updated 3 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Jun 30, 2017Updated 8 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆633Jun 20, 2017Updated 8 years ago
- OpenCV based IDN option generator PoC☆39Jan 18, 2017Updated 9 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Mar 7, 2021Updated 4 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆444Nov 30, 2023Updated 2 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Mar 11, 2021Updated 4 years ago
- Powershell SAP assessment tool☆199Aug 13, 2018Updated 7 years ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆227May 8, 2018Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Jul 5, 2022Updated 3 years ago
- A proof of concept for the RDP Inception Attack☆353Jun 29, 2017Updated 8 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆177Dec 1, 2022Updated 3 years ago
- Nameserver DNS poisoning attacks made easy☆525Feb 26, 2017Updated 8 years ago
- Intercept, modify, repeat and attack Android's Binder transactions using Burp Suite☆323Aug 20, 2017Updated 8 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- Repository containing many useful scripts☆75Mar 30, 2022Updated 3 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆252Sep 27, 2023Updated 2 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆526Apr 14, 2023Updated 2 years ago
- A wrapper tool for shadowsocks to consistently bypass firewalls.☆81Dec 24, 2017Updated 8 years ago
- Powershell C2 Server and Implants☆574Nov 11, 2019Updated 6 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆401May 20, 2020Updated 5 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- Simple website to display the LAN status based on a nmap scan☆58Jan 5, 2023Updated 3 years ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆322Jun 5, 2017Updated 8 years ago
- Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa.☆451Dec 8, 2022Updated 3 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- ☆86Feb 28, 2017Updated 8 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆199Nov 19, 2017Updated 8 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- An SDN penetration testing toolkit☆117Oct 4, 2024Updated last year
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago