moloch54 / b4blood
Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI, scans SMB/NFS shares for passwords, scans for remote accesses, dumps NTDS.dit.
☆18Updated last year
Alternatives and similar repositories for b4blood:
Users that are interested in b4blood are comparing it to the libraries listed below
- This repository presents a proof-of-concept of CVE-2023-22527☆13Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Updated 6 months ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated last year
- Saves pages to Wayback machine☆13Updated last month
- Public repo of Nuclei scanner templates.☆18Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆17Updated last year
- Tomcat backdoor based on CS blog☆27Updated last year
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆20Updated 2 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆15Updated last year
- Ffuf output browser☆39Updated last year
- evasion of defender☆9Updated 2 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆58Updated last year
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆23Updated last year
- H&E- Burp Highlighter and Extractor☆18Updated last year
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago
- ☆26Updated 2 years ago
- tool that generates bypasses for open redirects☆50Updated 2 years ago
- FireProx written in Go☆19Updated 9 months ago
- A web application attack surface mapping tool. It takes in a list of urls then performs numerous probes☆15Updated 2 years ago
- ☆52Updated last year
- A simple tool which makes creating nuclei templates even easier.☆36Updated 7 months ago
- Right-To-Left Override POC☆34Updated 2 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆20Updated 5 months ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated 8 months ago
- Simple tools to handle string and generate subdomain permutations☆14Updated 2 years ago
- ☆29Updated 9 months ago
- Reversing Citrix Gateway for XSS☆15Updated last year