Some Python tooling to for example try to decrypt CyberArk .cred credential files
☆59Apr 29, 2023Updated 2 years ago
Alternatives and similar repositories for CyberArkTools
Users that are interested in CyberArkTools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A PoC executing shellcode in Dart☆14Jun 28, 2022Updated 3 years ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- A simple COM server which provides a component to run shellcode☆148May 12, 2020Updated 5 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Python code to Serialize and Unserialize java binary serialization format.☆29Feb 27, 2026Updated last month
- Username lists that I created.☆17Aug 9, 2021Updated 4 years ago
- ☆12Oct 24, 2022Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆95Apr 4, 2026Updated last week
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- Impersonating authentication over HTTP and/or named pipes.☆144Apr 2, 2021Updated 5 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆18Aug 31, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Partially offline multi-language translator built upon Huggingface transformers.☆16Sep 12, 2022Updated 3 years ago
- ☆22Dec 30, 2025Updated 3 months ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- Beacon Object File & C# project to check LDAP signing☆200Aug 7, 2024Updated last year
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆109May 19, 2022Updated 3 years ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- MS-FSRVP coercion abuse PoC☆302Dec 30, 2021Updated 4 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- TokenCert☆102Nov 15, 2024Updated last year
- A robust Red Team proxy written in Go.☆164Dec 26, 2021Updated 4 years ago
- A module for CME that spiders across a domain.☆35Jul 15, 2022Updated 3 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆247Feb 23, 2022Updated 4 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆41Oct 29, 2024Updated last year
- A simple PE loader.☆27Dec 9, 2022Updated 3 years ago
- Recovering NTLM hashes from Credential Guard☆379Dec 26, 2022Updated 3 years ago
- ☆60Aug 11, 2023Updated 2 years ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆46Nov 29, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆128Mar 1, 2023Updated 3 years ago
- Inject .NET assemblies into an existing process☆508Jan 19, 2022Updated 4 years ago
- ☆64Jan 2, 2024Updated 2 years ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆141Mar 19, 2024Updated 2 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆31Feb 13, 2026Updated last month
- ☆10May 29, 2023Updated 2 years ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆156Nov 2, 2025Updated 5 months ago