fullmetalcache / tools
Various tools, scripts, and techniques
☆19Updated 4 years ago
Alternatives and similar repositories for tools:
Users that are interested in tools are comparing it to the libraries listed below
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆45Updated 7 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆31Updated 8 years ago
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Updated 7 years ago
- Web Filter External Enumeration Tool (WebFEET)☆76Updated 10 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Updated 6 years ago
- Custom stagers with python encrypting proxy☆39Updated 9 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Updated 5 years ago
- Run PowerShell command without invoking powershell.exe☆12Updated 7 years ago
- Powershell Persistence Locator☆66Updated 8 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Password spraying script and helper for creating password lists☆34Updated 4 years ago
- Script to automate, manage, and multithread Nikto scans.☆60Updated 5 years ago
- 504 VSAgent☆23Updated 7 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆65Updated 7 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆54Updated 8 years ago
- ☆12Updated 8 years ago
- Small scripts to assist in pentesting☆19Updated 4 years ago
- Executes lateral movement through PowerPoint DCOM objects☆19Updated 7 years ago
- AWS S3 Bucket/Object Finder☆24Updated 7 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆32Updated 6 years ago
- Generates anti-sandbox analysis HTA files without payloads☆15Updated 8 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆42Updated 4 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆50Updated 7 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆74Updated 7 years ago
- Useful Threat Hunting Stuff☆32Updated 4 years ago
- ☆83Updated 9 years ago
- ☆52Updated 11 years ago
- ☆17Updated 7 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 6 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago