hnsecurity / kraken
Generate a report with charts and statistics about cracked passwords in XLSX format
☆33Updated 3 weeks ago
Alternatives and similar repositories for kraken:
Users that are interested in kraken are comparing it to the libraries listed below
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆40Updated 11 months ago
- ☆26Updated last year
- fully async implementation of Dirkjan's ROADTools☆31Updated last week
- ☆43Updated 8 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆74Updated 4 months ago
- Discord C2 Profile for Mythic☆28Updated last month
- Living off the land searches for explorer and sharepoint☆57Updated 4 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- ☆52Updated last year
- A user enumeration tool for Slack.☆26Updated 9 months ago
- ☆34Updated last year
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆13Updated 6 months ago
- BloodHound PowerShell client☆51Updated last week
- 🌩️ Collection of BloodHound queries for Azure☆60Updated 2 months ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated 8 months ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆49Updated 6 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆37Updated last week
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- ☆71Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- A small script that automates Entra ID persistence with Windows Hello For Business key☆55Updated last month
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated last month
- Docker container for running CobaltStrike 4.10☆36Updated 6 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆36Updated 2 months ago