Some Python tooling to for example try to decrypt CyberArk .cred credential files
☆60Apr 29, 2023Updated 2 years ago
Alternatives and similar repositories for CyberArkTools
Users that are interested in CyberArkTools are comparing it to the libraries listed below
Sorting:
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- Python code to Serialize and Unserialize java binary serialization format.☆30Updated this week
- A simple COM server which provides a component to run shellcode☆149May 12, 2020Updated 5 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Jul 18, 2022Updated 3 years ago
- ☆22Dec 30, 2025Updated 2 months ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆95Aug 1, 2022Updated 3 years ago
- Partially offline multi-language translator built upon Huggingface transformers.☆17Sep 12, 2022Updated 3 years ago
- Impersonating authentication over HTTP and/or named pipes.☆145Apr 2, 2021Updated 4 years ago
- Username lists that I created.☆17Aug 9, 2021Updated 4 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆187Jun 22, 2022Updated 3 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆19Aug 31, 2022Updated 3 years ago
- ☆59Aug 11, 2023Updated 2 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25May 29, 2023Updated 2 years ago
- MS-FSRVP coercion abuse PoC☆303Dec 30, 2021Updated 4 years ago
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆45Nov 29, 2024Updated last year
- Capture The Flag competition challenge write-ups☆22Jun 10, 2023Updated 2 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆110May 19, 2022Updated 3 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆42Oct 29, 2024Updated last year
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- ☆12Feb 24, 2023Updated 3 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- A simple PE loader.☆27Dec 9, 2022Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆244Jul 14, 2021Updated 4 years ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆139Mar 19, 2024Updated last year
- Recovering NTLM hashes from Credential Guard☆377Dec 26, 2022Updated 3 years ago
- Beacon Object File & C# project to check LDAP signing☆199Aug 7, 2024Updated last year
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆13Jul 16, 2025Updated 7 months ago
- Fetching data from system☆12Jun 18, 2017Updated 8 years ago
- A script used to query the dehashed API and filter for more useful results☆16Jun 20, 2021Updated 4 years ago
- ☆11Oct 24, 2022Updated 3 years ago
- ☆129Mar 1, 2023Updated 3 years ago
- Inject .NET assemblies into an existing process☆508Jan 19, 2022Updated 4 years ago
- ☆159Feb 8, 2025Updated last year
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Sep 30, 2024Updated last year