llt4l / iCULeak.pyView external linksLinks
Tool to find and extract credentials from phone configuration files hosted on CUCM
☆104May 4, 2019Updated 6 years ago
Alternatives and similar repositories for iCULeak.py
Users that are interested in iCULeak.py are comparing it to the libraries listed below
Sorting:
- ☆199Jan 30, 2026Updated 2 weeks ago
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- Discover Printers☆168Sep 18, 2019Updated 6 years ago
- ☆16May 20, 2022Updated 3 years ago
- ☆14Aug 27, 2025Updated 5 months ago
- Artifact monitoring that ensures fairplay☆79Jan 29, 2025Updated last year
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Jan 3, 2020Updated 6 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆504Sep 23, 2025Updated 4 months ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Jul 18, 2022Updated 3 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆448Nov 2, 2023Updated 2 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆402Feb 27, 2024Updated last year
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆114Feb 21, 2023Updated 2 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆67Oct 3, 2020Updated 5 years ago
- Hunt Open MongoDB instances☆79Sep 25, 2019Updated 6 years ago
- ☆413Apr 28, 2021Updated 4 years ago
- CUCM Bulk TFTP Upload☆12Jun 4, 2018Updated 7 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Dec 4, 2020Updated 5 years ago
- NTLM relaying for Windows made easy☆579Apr 25, 2023Updated 2 years ago
- Enumerate Domain Data☆335Sep 13, 2023Updated 2 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆532Nov 19, 2024Updated last year
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆50May 3, 2022Updated 3 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- ☆65Jan 2, 2024Updated 2 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Oct 29, 2024Updated last year
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Dec 17, 2021Updated 4 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆448Aug 18, 2023Updated 2 years ago
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- gather gather gather☆584Mar 15, 2025Updated 10 months ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Mar 2, 2022Updated 3 years ago
- Easy files and payloads delivery over DNS☆424Jan 3, 2026Updated last month
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆141Apr 29, 2019Updated 6 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆372Feb 23, 2024Updated last year
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago