Password Guessing for different Web Portals
☆29Nov 14, 2018Updated 7 years ago
Alternatives and similar repositories for conformer
Users that are interested in conformer are comparing it to the libraries listed below
Sorting:
- Trying to be the best tool to search for exploits in the terminal.☆12Jul 3, 2017Updated 8 years ago
- Project HMS☆10Jun 11, 2018Updated 7 years ago
- A proving grounds for young and aspiring BBOT modules☆15Aug 31, 2022Updated 3 years ago
- A collection of scripts used to support an OffSecOps pipeline.☆15Jan 31, 2021Updated 5 years ago
- This repo contains the lazyFuzzer and the Report on the output from the same☆17Oct 26, 2019Updated 6 years ago
- Magento shoplift exploit is vulnerability which was discovered by CheckPoint team (http://blog.checkpoint.com/2015/04/20/analyzing-magent…☆13Aug 25, 2015Updated 10 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆17Aug 6, 2019Updated 6 years ago
- Ingest openldap data into bloodhound☆79Apr 1, 2021Updated 4 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆108Aug 13, 2018Updated 7 years ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 5 years ago
- Tool to exploit CVE-2018-13341 and recover hidden account password on Crestron devices☆25Dec 13, 2019Updated 6 years ago
- My PowerShell bag of tricks☆26Aug 2, 2017Updated 8 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- Tool for exploiting SQL injection vulnerabilities that sqlmap can't find.☆97May 24, 2018Updated 7 years ago
- Plugins for the Serpico Project☆23Dec 4, 2018Updated 7 years ago
- Password Spraying Framework☆64Jun 9, 2022Updated 3 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Jun 26, 2020Updated 5 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Aug 18, 2020Updated 5 years ago
- Common Findings Database☆101Jul 25, 2019Updated 6 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Feb 9, 2024Updated 2 years ago
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆29Jul 18, 2021Updated 4 years ago
- Adhoc scripts☆30Feb 12, 2017Updated 9 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- REPTILEHAUS' simplified build process of Worawit Wang' (@sleepya_) version of EternalBlue.. The NSA exploit brought to you by the ShadowB…☆128Dec 18, 2022Updated 3 years ago
- Cloud metadata extraction tools and scripts☆34May 22, 2023Updated 2 years ago
- ☆12Apr 8, 2025Updated 10 months ago
- ☆10Updated this week
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆116Feb 17, 2026Updated last week
- Fast and extensible network scanning library featuring multithreading, ping probing, and scan fetchers.☆40May 1, 2020Updated 5 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- Python3 implementation of Cryptographic attacks. Applcations examples introduced on my blog.☆24Apr 20, 2018Updated 7 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Dec 29, 2016Updated 9 years ago
- Subdomain Enumeration and Scanner☆35Jun 8, 2020Updated 5 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- Rainbow table generation & lookup tools. Make Rainbow Tables Great Again!☆221Aug 4, 2021Updated 4 years ago
- avarehelper☆12Aug 15, 2021Updated 4 years ago