jabbaw0nky / DragonShiftLinks
A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability
☆29Updated last year
Alternatives and similar repositories for DragonShift
Users that are interested in DragonShift are comparing it to the libraries listed below
Sorting:
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆180Updated last year
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆110Updated 2 months ago
- Python utility that generates "imageless" QR codes in various formats☆128Updated last year
- pysnaffler☆102Updated last month
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated 11 months ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- ☆112Updated 3 months ago
- ☆91Updated 8 months ago
- Custom queries list for BloodHound☆29Updated 2 months ago
- The CAPTCHA-resilient contact scraper.☆26Updated last year
- linikatz is a tool to attack AD on UNIX☆150Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- sturdy-chainsaw☆65Updated 2 years ago
- Parses Snaffler output file and generate beautified outputs.☆107Updated 7 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆122Updated 5 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆115Updated 8 months ago
- Efflanrs - GUI for Snaffler Output☆27Updated last year
- ☆12Updated 11 months ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆44Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆95Updated 2 years ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆130Updated 7 months ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆46Updated last year
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆203Updated 4 months ago
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆40Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated 11 months ago
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆171Updated 4 months ago
- Easy red team phishing with Puppeteer☆132Updated 2 years ago
- Utilities for obfuscating shellcode☆91Updated this week
- A simple Python script to do quick, targeted recon of a given domain.☆25Updated 5 months ago
- ☆71Updated 6 months ago