githubkuyaya / LaZasswordLinks
Password recovery payload for the BashBunny, using LaZagne.
☆12Updated 4 years ago
Alternatives and similar repositories for LaZassword
Users that are interested in LaZassword are comparing it to the libraries listed below
Sorting:
- ☆25Updated 5 years ago
- HoppEye is a simple payload picker for BashBunny based on linking payloads to LED color.☆30Updated 7 years ago
- ☆19Updated 7 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- SMBMap is a handy SMB enumeration tool☆37Updated 11 months ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆26Updated 8 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 7 years ago
- Converts a command to a base64 powershell compatible string☆26Updated 10 years ago
- Modern problems require modern solutions☆31Updated 2 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- PowerShell Reverse HTTPs Shell☆27Updated 10 years ago
- Fully-featured spear-phishing toolkit - web front-end☆51Updated 4 months ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- ☆24Updated 9 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆57Updated 5 years ago
- Combined PowerShell and CMD Reverse Shell☆13Updated 5 years ago
- AV/EDR evasion via direct system calls.☆32Updated 4 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- polymorphic webshells☆30Updated 7 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆39Updated 4 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Updated 8 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Backdoor en powershell vía Telegram☆30Updated 8 years ago
- PHP Script intdended to be used during Phishing campaigns as a credentials collector linked to backdoored HTML <form> action parameter☆59Updated 3 years ago
- One line PS scripts that may come handy during your network assesment☆78Updated 5 years ago