A tool for quickly evaluating IAM permissions in AWS.
☆60Nov 6, 2023Updated 2 years ago
Alternatives and similar repositories for PMapper
Users that are interested in PMapper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆80Nov 18, 2024Updated last year
- Ansible build for Afl++ Frida-Mode☆25Jun 8, 2024Updated last year
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- Scripts that automate portions of pentests.☆58Mar 4, 2026Updated 2 weeks ago
- Dump Kerberos tickets from the KCM database of SSSD☆56Dec 31, 2025Updated 2 months ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Apr 5, 2024Updated last year
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated last year
- ☆15Jun 27, 2024Updated last year
- AI Substitutor is an extension for Burp Suite that uses AI functionality to substitute values of HTTP request parameters and headers.☆27Apr 30, 2025Updated 10 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆133Oct 4, 2024Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated last year
- WhoAmI by asking the LDAP service on a domain controller.☆65Feb 8, 2022Updated 4 years ago
- Exploits Unauth Docker API☆43Apr 18, 2025Updated 11 months ago
- ☆100Sep 1, 2024Updated last year
- ☆53Oct 29, 2024Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 8 months ago
- Decrypt Veeam database passwords☆221Dec 8, 2025Updated 3 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- Resources Links for the Research Based on Josh Prager and Nico Shyne's☆13Oct 21, 2024Updated last year
- Azure DevOps Services Attack Toolkit☆149Mar 15, 2025Updated last year
- Easily obfuscate your html!☆99Apr 7, 2024Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆226Nov 23, 2023Updated 2 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- Okta Verify and Okta FastPass Abuse Tool☆341Sep 4, 2024Updated last year
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Aug 16, 2023Updated 2 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆898Mar 11, 2026Updated last week
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year
- ☆27May 1, 2023Updated 2 years ago
- Abusing Azure services over C2☆367Jan 20, 2026Updated 2 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 10 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 2 years ago
- ☆44Jul 9, 2024Updated last year
- ☆29May 22, 2024Updated last year
- scan for NTLM directories☆381Aug 13, 2025Updated 7 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆211Sep 30, 2024Updated last year
- Validates priv escalation of AD trusts☆47Apr 1, 2025Updated 11 months ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year