Some Python tooling to for example try to decrypt CyberArk .cred credential files
☆59Apr 29, 2023Updated 2 years ago
Alternatives and similar repositories for CyberArkTools
Users that are interested in CyberArkTools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CyberArk Credentials Provider (CCP) Plugin for HashiCorp Vault☆17Jan 12, 2024Updated 2 years ago
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- Ansible role to deploy Cyberark Central Policy Manager☆15Dec 5, 2024Updated last year
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- Ansible role to deploy Cyberark Privileged Session Manager☆15Feb 19, 2025Updated last year
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- A utility to check CyberArk component servers hardening status☆63Jun 1, 2022Updated 3 years ago
- Ansible role to deploy Cyberark Password Vault Web Access☆20Mar 13, 2026Updated last week
- A simple COM server which provides a component to run shellcode☆148May 12, 2020Updated 5 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- Python code to Serialize and Unserialize java binary serialization format.☆29Feb 27, 2026Updated 3 weeks ago
- Username lists that I created.☆17Aug 9, 2021Updated 4 years ago
- ☆12Oct 24, 2022Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆94Aug 1, 2022Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- Impersonating authentication over HTTP and/or named pipes.☆144Apr 2, 2021Updated 4 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆18Aug 31, 2022Updated 3 years ago
- Partially offline multi-language translator built upon Huggingface transformers.☆16Sep 12, 2022Updated 3 years ago
- Powershell Module for CyberArk PACLI☆77Apr 1, 2020Updated 5 years ago
- ☆22Dec 30, 2025Updated 2 months ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- Beacon Object File & C# project to check LDAP signing☆199Aug 7, 2024Updated last year
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆109May 19, 2022Updated 3 years ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- MS-FSRVP coercion abuse PoC☆302Dec 30, 2021Updated 4 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- TokenCert☆102Nov 15, 2024Updated last year
- A robust Red Team proxy written in Go.☆164Dec 26, 2021Updated 4 years ago
- A module for CME that spiders across a domain.☆35Jul 15, 2022Updated 3 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆246Feb 23, 2022Updated 4 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆41Oct 29, 2024Updated last year
- A simple PE loader.☆27Dec 9, 2022Updated 3 years ago
- Recovering NTLM hashes from Credential Guard☆377Dec 26, 2022Updated 3 years ago
- ☆60Aug 11, 2023Updated 2 years ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆45Nov 29, 2024Updated last year
- ☆128Mar 1, 2023Updated 3 years ago