jabbaw0nky / DragonShiftLinks
A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability
☆47Updated last year
Alternatives and similar repositories for DragonShift
Users that are interested in DragonShift are comparing it to the libraries listed below
Sorting:
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆114Updated 4 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆67Updated 10 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆182Updated last year
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆128Updated 7 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆155Updated 9 months ago
- Script to perform some hashcracking logic automagically☆78Updated last week
- Ready to go Phishing Platform☆56Updated last year
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆216Updated 2 weeks ago
- Generate graphs and charts based on password cracking result☆164Updated 2 years ago
- The CAPTCHA-resilient contact scraper.☆34Updated last year
- linikatz is a tool to attack AD on UNIX☆149Updated 2 years ago
- ☆111Updated 3 years ago
- sturdy-chainsaw☆67Updated 2 years ago
- ☆118Updated 5 months ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆48Updated last year
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆119Updated 10 months ago
- This is the repository which is synced to the gitbook wiki at https://www.netexec.wiki/☆61Updated last week
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated last year
- A community-driven collection of BloodHound queries☆153Updated last month
- Azure Service Subdomain Enumeration☆67Updated last year
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆132Updated 3 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆170Updated 3 weeks ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆130Updated 10 months ago
- crEAP will identify WPA Enterprise mode EAP types and harvest usernames and/or handshakes if insecure protocols are in use.☆31Updated 3 years ago
- ☆92Updated 10 months ago
- Vast.ai Password Kracking☆89Updated 3 weeks ago
- pysnaffler☆106Updated 3 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 9 months ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆79Updated 2 years ago
- ☆78Updated 6 months ago