grutz / squirtleView external linksLinks
Squirtle the Browser-based NTLM Attack Toolkit
☆17Apr 13, 2015Updated 10 years ago
Alternatives and similar repositories for squirtle
Users that are interested in squirtle are comparing it to the libraries listed below
Sorting:
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 8 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- Get all AD objects which are hidden from you☆18Aug 21, 2017Updated 8 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- ☆12Sep 4, 2013Updated 12 years ago
- Credentials recovery project☆11May 12, 2015Updated 10 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- Language-agnostic workflow builder. Modular code that goes from dev to prod in a minute with principled design decisions.☆13Mar 11, 2024Updated last year
- ☆164Aug 28, 2015Updated 10 years ago
- This repository contains hit lists to use for web application content discovery.☆11May 31, 2017Updated 8 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 3 months ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 3 years ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- Dump LSASS process in Task Manager without triggering Defender.☆18Apr 6, 2023Updated 2 years ago
- js-beautifier extension for Burp Suite☆30Jun 24, 2013Updated 12 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆35Nov 15, 2024Updated last year
- ☆21Jul 15, 2016Updated 9 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- A curated list of awesome AWS IAM tools, libraries guides, blogs, and other resources☆17Jan 5, 2020Updated 6 years ago
- when pass change ,send the pass to remote host☆20Jan 19, 2020Updated 6 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆70Jul 26, 2018Updated 7 years ago
- Offline Digital Forensics Tool for Binary Files☆38Nov 6, 2017Updated 8 years ago
- Blackmamba is a new concurrent networking library for Python. Blackmamba was built from the ground up leveraging the power of epoll and c…☆44Oct 2, 2013Updated 12 years ago
- Collaborative Distributed Scanning Application (Uses modified DNmap on backend)☆71Jun 10, 2016Updated 9 years ago
- ☆85May 19, 2015Updated 10 years ago
- Using rfcat for home automation to control a MInka Aire fan.☆22Oct 27, 2023Updated 2 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Nov 15, 2018Updated 7 years ago
- A simple bash script that uses smbclient to test access to Windows file shares in automated fashion.☆19Jul 9, 2015Updated 10 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Apr 14, 2016Updated 9 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆49May 3, 2017Updated 8 years ago
- ☆45Jul 18, 2016Updated 9 years ago
- test your Diffie-Hellman parameters for safe primes and right sizes☆20May 23, 2016Updated 9 years ago
- Document created to serve as a first step to learn about blockchain and smart contract security.☆19Sep 20, 2021Updated 4 years ago
- Reconstruct javascript from a sourcemap in bash☆38Nov 23, 2021Updated 4 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- sleepy puppy docker setup☆44Aug 30, 2018Updated 7 years ago
- Small utility package for manipulating Windows process tokens☆26Apr 26, 2022Updated 3 years ago