mpgn / ntlmrelayx-prettylootView external linksLinks
Convert the loot directory of ntlmrelayx into an enum4linux like output
☆22Apr 12, 2020Updated 5 years ago
Alternatives and similar repositories for ntlmrelayx-prettyloot
Users that are interested in ntlmrelayx-prettyloot are comparing it to the libraries listed below
Sorting:
- Collection of antivirus bypass techniques☆12Nov 20, 2023Updated 2 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Aug 31, 2023Updated 2 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆16Apr 30, 2021Updated 4 years ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆17Feb 19, 2023Updated 2 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- A script to enumerate valid usernames based on the requests response times.☆22May 3, 2022Updated 3 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- Scan for OSGi Consoles☆21Feb 22, 2024Updated last year
- Automated Subnet Scanner☆27Feb 25, 2025Updated 11 months ago
- Tool queries the OpenAI API to enhance the description, impact, and recommendation keys of a nuclei template.☆21Apr 1, 2023Updated 2 years ago
- RedTeam network tool based on OrangePi R1☆24Jan 27, 2025Updated last year
- Converts a hostname (or URI) to IP address using your local resolver☆26Mar 31, 2024Updated last year
- windows-kernel-exploits Windows平台提权漏洞集合☆27Jan 8, 2018Updated 8 years ago
- Simple Recon is just a simple bash script to automate my recon process.☆27May 12, 2021Updated 4 years ago
- Validate proxies for specific domain☆38Aug 14, 2021Updated 4 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 7 years ago
- a collection of profiles for macOS designed for penetration testing or red teaming☆38Apr 15, 2019Updated 6 years ago
- ☆14Dec 11, 2025Updated 2 months ago
- A little implant which SSH's back with a shell☆38Feb 1, 2022Updated 4 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46May 31, 2023Updated 2 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 4 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆42Feb 6, 2019Updated 7 years ago
- ☆14Jul 26, 2017Updated 8 years ago
- Tool support for literature review subtle process.☆18May 5, 2017Updated 8 years ago
- A .NET binary loader that bypasses AMSI☆45Sep 20, 2021Updated 4 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Cookiecutter template for creating Ansible roles. Includes tests for TravisCI using Molecule.☆13Dec 14, 2021Updated 4 years ago
- PowerShell script to disable NetBIOS on Windows☆12Jul 19, 2021Updated 4 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Apr 13, 2020Updated 5 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆50May 3, 2022Updated 3 years ago
- Wraps projectdiscovery's cdncheck library to exclude CDN hosts from input passed over stdin☆45Mar 13, 2023Updated 2 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Feb 16, 2023Updated 3 years ago
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 2 months ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 3 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year