kudelskisecurity / ecdsa-dump-tls
☆13Updated 2 years ago
Alternatives and similar repositories for ecdsa-dump-tls:
Users that are interested in ecdsa-dump-tls are comparing it to the libraries listed below
- Tools for attacking various MIFARE RFID cards☆15Updated 5 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆14Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 10 months ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Free Email Providers☆10Updated last year
- Easily-guessable Password Generator for Password Spray Attack☆21Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- ☆24Updated 2 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 4 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 3 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆26Updated 6 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 3 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- ☆22Updated 4 years ago
- A C# Tool to gather information about email breaches☆14Updated last year
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆12Updated last year
- Library of Crypto exploits☆9Updated last year
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Updated 3 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- Kibana app for RedELK☆17Updated 2 years ago
- Tools to recover, extract and decrypt metamask wallets☆18Updated 3 weeks ago