h1kari / desrtop
DES Rainbow Table Online Phase
☆21Updated 7 years ago
Related projects: ⓘ
- ☆16Updated 7 years ago
- Data exfiltration using reflective DNS resolution covert channel☆51Updated 6 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 4 years ago
- A browser based visualization of domain trusts. Give it a csv, get a pretty diagram to play with!☆18Updated 5 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆31Updated 5 years ago
- Exfiltration based on custom X509 certificates☆25Updated 6 months ago
- ☆19Updated this week
- Impacket is a collection of Python classes for working with network protocols.☆17Updated 4 years ago
- LetMeOutOfYour.net Resources☆19Updated 4 years ago
- ☆36Updated 5 years ago
- ☆18Updated this week
- Enumerate RIDs using pure Python☆30Updated last month
- automatic scan for hackthebox☆14Updated 4 years ago
- Microsoft Applocker evasion tool☆38Updated 4 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- Random Hashcat Scrips☆19Updated last year
- Generic malicious browser check written in C#☆12Updated 8 years ago
- Automation Engine using the Covenant API and lua scripting☆24Updated last year
- My python3 implementation of a Forward Shell☆35Updated 5 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆36Updated 4 years ago
- ☆53Updated this week
- Exploits developped by Outflank B.V. team members☆20Updated 7 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆24Updated 2 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆16Updated 3 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆28Updated 6 years ago
- various slides and presentations I've worked on☆18Updated 6 months ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Updated 5 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- Methods of C2☆21Updated 9 years ago