jabbaw0nky / DragonShiftLinks
A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability
☆53Updated last year
Alternatives and similar repositories for DragonShift
Users that are interested in DragonShift are comparing it to the libraries listed below
Sorting:
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago
- This is the repository which is synced to the gitbook wiki at https://www.netexec.wiki/☆62Updated last week
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆116Updated 5 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆156Updated 10 months ago
- ☆173Updated 9 months ago
- Continuous password spraying tool☆198Updated last month
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆257Updated 2 months ago
- ☆120Updated 7 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆132Updated 9 months ago
- LDAP Enumeration Tool for Pentesters☆48Updated 8 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆184Updated last year
- A community-driven collection of BloodHound queries☆159Updated this week
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆171Updated 3 weeks ago
- Everything and anything related to password spraying☆151Updated last year
- ☆94Updated 11 months ago
- Detect common NFS server misconfigurations☆91Updated 7 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated last year
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆49Updated last year
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆120Updated 11 months ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆139Updated 5 months ago
- ☆99Updated 3 months ago
- ☆117Updated 3 years ago
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 6 months ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆166Updated 6 months ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆138Updated 2 years ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆219Updated 8 months ago
- A collection of tools that I use in CTF's or for assessments☆104Updated 11 months ago
- Make everyone in your VLAN ASRep roastable☆242Updated 3 months ago
- A solution to create obfuscated reverse shells for PowerShell.☆82Updated 3 years ago