hackthelegacy / hack400tool
hack400tool
☆94Updated 6 years ago
Related projects: ⓘ
- A collection of files for adding and leveraging custom properties in BloodHound.☆181Updated 4 years ago
- Active Directory enumeration from non-domain system.☆116Updated 7 years ago
- ☆85Updated this week
- 3 tools that work together to simplify reconaissance of Windows File Shares☆161Updated 6 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆116Updated 4 years ago
- Burp Suite extension to perform Kerberos authentication☆103Updated 2 months ago
- Implementing Kerberoast attack fully in python☆72Updated 5 years ago
- DefCon24☆119Updated 8 years ago
- Domain user enumeration tool☆212Updated 10 months ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆179Updated 7 years ago
- Easy 802.1Q VLAN Hopping☆79Updated last month
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆78Updated 3 months ago
- An automated SMB relay exploitation script.☆151Updated 7 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆89Updated 10 years ago
- This is a simple parser for/decrypter for Impacket's esentutl.py utility. It assists with decrypting hashes and hash histories from ntds.…☆70Updated 7 years ago
- Liniaal - A communication extension to Ruler☆96Updated 6 years ago
- WhiteBox CMS analysis☆68Updated last year
- ☆84Updated this week
- ☆214Updated this week
- POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's s…☆102Updated 7 years ago
- The Outlook HTML Leak Test Project☆132Updated 6 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆71Updated 6 years ago
- Various Cheat Sheets☆179Updated 3 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 7 years ago
- A WebDAV PROPFIND C2 tool☆118Updated 5 years ago
- ☆111Updated 7 years ago
- Python script to exploit java unserialize on t3 (Weblogic)☆61Updated 7 years ago
- Python Tool for Host Enumeration☆50Updated 7 years ago
- Common Findings Database☆100Updated 5 years ago
- ☆73Updated 7 years ago