A proof-of-concept for (CVE-2023-38840) that extracts plaintext master passwords from a locked Bitwarden vault.
☆42Mar 1, 2024Updated 2 years ago
Alternatives and similar repositories for bw-dump
Users that are interested in bw-dump are comparing it to the libraries listed below
Sorting:
- Claude MCP server to perform analysis on ROADrecon data☆48Mar 30, 2025Updated 11 months ago
- A swiss army knife for pentesting networks☆25Sep 3, 2022Updated 3 years ago
- ☆17Jun 28, 2023Updated 2 years ago
- Stupid Simple Detection Testing☆13Mar 7, 2024Updated last year
- Nmap to MongoDB☆11Mar 21, 2019Updated 6 years ago
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 6 months ago
- DNS Stamps library for Go☆19Dec 10, 2025Updated 2 months ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 3 months ago
- Tool to enumerate unregistered reply URLs for single and multitenant apps in Azure☆15Jan 23, 2025Updated last year
- Purple Team Dropper generator using open source templates.☆17May 23, 2024Updated last year
- ☆41Sep 9, 2023Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- Fun GUI for Group3rs output log☆37Aug 14, 2023Updated 2 years ago
- ☆102Oct 27, 2022Updated 3 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Aug 26, 2022Updated 3 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆21Nov 28, 2025Updated 3 months ago
- Create an incident response triage toolkit for use with Windows or Linux.☆18Jun 14, 2020Updated 5 years ago
- ☆19Nov 28, 2024Updated last year
- Self delete DLL (2)☆14Feb 15, 2024Updated 2 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- ☆107Jan 4, 2023Updated 3 years ago
- ☆53Feb 4, 2025Updated last year
- Collection of shellcode injection and execution techniques☆18Aug 21, 2025Updated 6 months ago
- ☆47Feb 11, 2023Updated 3 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- Java XMLDecoder payload generator☆16Jul 27, 2021Updated 4 years ago
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated last year
- ☆27May 6, 2024Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆50Mar 2, 2022Updated 4 years ago
- ☆28Oct 15, 2025Updated 4 months ago
- Docker container for running CobaltStrike 4.7 and above☆24Mar 20, 2025Updated 11 months ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- Self Delete DLL☆23Feb 15, 2024Updated 2 years ago
- Various AD tools needed for penetration testing in one place.☆23Jul 13, 2023Updated 2 years ago
- A tool for fetching DFIR and other GitHub tools.☆25Aug 2, 2025Updated 7 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- ☆60Jan 9, 2023Updated 3 years ago
- SMB Audit Tool you were looking for☆24Jun 16, 2023Updated 2 years ago
- PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This projec…☆43Nov 9, 2025Updated 3 months ago