localh0t / m4ngl3m3View external linksLinks
Common password pattern generator using strings list
☆131Nov 26, 2020Updated 5 years ago
Alternatives and similar repositories for m4ngl3m3
Users that are interested in m4ngl3m3 are comparing it to the libraries listed below
Sorting:
- ☆26Apr 5, 2020Updated 5 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Jul 2, 2018Updated 7 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Lama, the application that does not mache these words.☆23Jun 9, 2019Updated 6 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 7 years ago
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆124Jan 4, 2018Updated 8 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆150Jun 24, 2018Updated 7 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Reconnaissance tool for Microsoft Office 365☆69Nov 21, 2018Updated 7 years ago
- DLL Password Filter Implant with Exfiltration Capabilities☆138Feb 24, 2020Updated 5 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Security Tool to detect arp poisoning attacks☆54Apr 15, 2018Updated 7 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆212Mar 27, 2022Updated 3 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆104Feb 6, 2018Updated 8 years ago
- C# port of LogServiceCrash☆46Oct 7, 2020Updated 5 years ago
- Word split utility☆13Jun 21, 2018Updated 7 years ago
- Still in dev mode☆12Apr 24, 2018Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 6 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆442Jul 11, 2017Updated 8 years ago
- NTLMv1 Multitool☆662Nov 30, 2025Updated 2 months ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆298Oct 2, 2019Updated 6 years ago
- ☆94Nov 1, 2018Updated 7 years ago
- a simple portforwarder in ps1 with embeded c# code☆90Jun 30, 2018Updated 7 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Aug 9, 2017Updated 8 years ago
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 2 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats…☆507Nov 19, 2024Updated last year
- ☆27Aug 18, 2023Updated 2 years ago
- Sp00fer blog post -☆24Jul 19, 2022Updated 3 years ago
- A ton of helpful tools☆344Oct 8, 2021Updated 4 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,438Nov 3, 2018Updated 7 years ago
- ☆108Oct 14, 2021Updated 4 years ago
- Phishing on Twitter☆251Jun 21, 2018Updated 7 years ago
- Using IPv6 to Bypass Security☆92Sep 4, 2025Updated 5 months ago