SMB Auto authentication Vulnerability
☆34Aug 1, 2016Updated 9 years ago
Alternatives and similar repositories for hashjacking
Users that are interested in hashjacking are comparing it to the libraries listed below
Sorting:
- some TLS utilities☆17Mar 4, 2016Updated 10 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆41Mar 24, 2018Updated 7 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Jun 24, 2016Updated 9 years ago
- A simplified SMB Email Client Attack script used for pentests.☆29Jan 31, 2019Updated 7 years ago
- Some scripts for attacks on Tacacs+ protocol☆66Aug 27, 2019Updated 6 years ago
- ☆55Jul 18, 2017Updated 8 years ago
- Customize Exploit Codes.☆18Dec 1, 2016Updated 9 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Nov 15, 2019Updated 6 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Mar 9, 2016Updated 10 years ago
- everything that does not fit elsewhere☆12Dec 27, 2017Updated 8 years ago
- PyQt plugin for Ida Pro for Screen recording.☆13Jul 27, 2016Updated 9 years ago
- Simulates Attacks of AB16 on Argon2i☆11Aug 4, 2016Updated 9 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- Tools developed to test the Redirect to SMB issue☆84Jun 2, 2015Updated 10 years ago
- h00k☆13Jul 28, 2016Updated 9 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆131Sep 26, 2016Updated 9 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- A repo with a listing of binary ninja scripts + plugins (massively inspired by https://github.com/onethawt/idaplugins-list)☆18Feb 19, 2017Updated 9 years ago
- bSidesLisbon 2016 event contents☆10Dec 14, 2016Updated 9 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Sep 13, 2017Updated 8 years ago
- Insecure web application used to test system security controls☆13Oct 14, 2025Updated 5 months ago
- Detect Phishing fetching Certificate Transparency Logs☆21Jan 13, 2021Updated 5 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- DNS2Proxy offensive proxy version for HSTS☆29Jan 1, 2018Updated 8 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Oct 28, 2016Updated 9 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Dec 11, 2015Updated 10 years ago
- DNS Enumeration and Reconnaissance Tool☆36Jan 19, 2016Updated 10 years ago
- A simple shellcode runner☆23Apr 20, 2014Updated 11 years ago
- Sample that demonstrates dynamic code loading from dex files over the network☆16Mar 21, 2016Updated 10 years ago
- php-cli vulnerability scanner☆79Jun 29, 2015Updated 10 years ago
- Executes lateral movement through PowerPoint DCOM objects☆20Feb 3, 2018Updated 8 years ago
- hexadecimal & URL encoder + decoder☆76Sep 28, 2017Updated 8 years ago
- MassBleed SSL Vulnerability Scanner☆247Apr 18, 2020Updated 5 years ago
- Python and Powershell internal penetration testing framework☆720Feb 22, 2016Updated 10 years ago
- A collection of nmap scripts I've written☆23Mar 27, 2016Updated 9 years ago