Convert the loot directory of ntlmrelayx into an enum4linux like output
☆22Apr 12, 2020Updated 5 years ago
Alternatives and similar repositories for ntlmrelayx-prettyloot
Users that are interested in ntlmrelayx-prettyloot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scan for OSGi Consoles☆21Feb 22, 2024Updated 2 years ago
- Collection of antivirus bypass techniques☆13Nov 20, 2023Updated 2 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Aug 31, 2023Updated 2 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86)☆13Sep 4, 2019Updated 6 years ago
- testing123☆13Nov 23, 2024Updated last year
- ☆13Feb 25, 2021Updated 5 years ago
- SoftICE-like debugger for Windows 2000 and XP. Archived.☆21Dec 23, 2022Updated 3 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- EyesOfNetwork 5.1 to 5.3 exploits☆13Mar 5, 2020Updated 6 years ago
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- iOS应用安全,网络证书校验,反调试,反注入☆16Jan 17, 2020Updated 6 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆17Apr 30, 2021Updated 4 years ago
- htop.dev website☆13Nov 5, 2024Updated last year
- ☆25Aug 15, 2016Updated 9 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- CVE-2022-23131漏洞利用工具开箱即用。☆11Apr 2, 2022Updated 3 years ago
- H2HC Community Project to Create Exploit Challenges for Practicing☆20Nov 24, 2012Updated 13 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- A static code analysis tool☆18Mar 17, 2025Updated last year
- RedTeam network tool based on OrangePi R1☆24Jan 27, 2025Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- windows-kernel-exploits Windows平台提权漏洞集合☆27Jan 8, 2018Updated 8 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- Automated Subnet Scanner☆26Feb 25, 2025Updated last year
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆17Feb 19, 2023Updated 3 years ago
- Win32k Elevation of Privilege Poc☆24May 17, 2019Updated 6 years ago
- A fun webtoons app. All comics on Inkverse are self-hosted by the creator.☆33Mar 13, 2026Updated 2 weeks ago
- Impacket is a collection of Python classes for working with network protocols.☆31Jun 27, 2024Updated last year
- Understanding Linux Kernel Vulnerability☆23Jan 9, 2018Updated 8 years ago
- Enumerate all visible network printers in local network☆19Jan 23, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Impacket is a collection of Python classes for working with network protocols.☆17Feb 3, 2026Updated last month
- Converts a hostname (or URI) to IP address using your local resolver☆26Mar 31, 2024Updated last year
- Statistics parsing for suricata☆18Nov 14, 2013Updated 12 years ago
- The Security Practices of Party A Phishing☆20Nov 9, 2019Updated 6 years ago
- shell prompt with git support☆32Dec 16, 2025Updated 3 months ago
- A script to enumerate valid usernames based on the requests response times.☆23May 3, 2022Updated 3 years ago
- Validate proxies for specific domain☆39Aug 14, 2021Updated 4 years ago