jabbaw0nky / DragonShiftLinks
A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability
☆36Updated last year
Alternatives and similar repositories for DragonShift
Users that are interested in DragonShift are comparing it to the libraries listed below
Sorting:
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆111Updated 3 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆181Updated last year
- The CAPTCHA-resilient contact scraper.☆26Updated last year
- linikatz is a tool to attack AD on UNIX☆147Updated last year
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆47Updated last year
- ☆92Updated 8 months ago
- Python utility that generates "imageless" QR codes in various formats☆129Updated last year
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆123Updated 6 months ago
- pysnaffler☆104Updated last month
- ☆71Updated 6 months ago
- ☆113Updated 4 months ago
- Most Responder's configuration power in your hand.☆51Updated 8 months ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆91Updated 2 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆115Updated 8 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆79Updated last year
- sturdy-chainsaw☆65Updated 2 years ago
- A little cheatsheet for NetExec☆27Updated last year
- Utilities for obfuscating shellcode☆94Updated 3 weeks ago
- Script to perform some hashcracking logic automagically☆74Updated last month
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated 11 months ago
- Living off the land searches for explorer and sharepoint☆90Updated 5 months ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆20Updated 2 years ago
- Easy red team phishing with Puppeteer☆132Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆96Updated 2 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆45Updated last year
- A community-driven collection of BloodHound queries☆147Updated this week
- Parses Snaffler output file and generate beautified outputs.☆107Updated 8 months ago