Convert the loot directory of ntlmrelayx into an enum4linux like output
☆22Apr 12, 2020Updated 5 years ago
Alternatives and similar repositories for ntlmrelayx-prettyloot
Users that are interested in ntlmrelayx-prettyloot are comparing it to the libraries listed below
Sorting:
- Collection of antivirus bypass techniques☆13Nov 20, 2023Updated 2 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Aug 31, 2023Updated 2 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆16Apr 30, 2021Updated 4 years ago
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆17Feb 19, 2023Updated 3 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- A script to enumerate valid usernames based on the requests response times.☆22May 3, 2022Updated 3 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- Scan for OSGi Consoles☆21Feb 22, 2024Updated 2 years ago
- Automated Subnet Scanner☆26Feb 25, 2025Updated last year
- Tool queries the OpenAI API to enhance the description, impact, and recommendation keys of a nuclei template.☆21Apr 1, 2023Updated 2 years ago
- Converts a hostname (or URI) to IP address using your local resolver☆26Mar 31, 2024Updated last year
- RedTeam network tool based on OrangePi R1☆24Jan 27, 2025Updated last year
- windows-kernel-exploits Windows平台提权漏洞集合☆27Jan 8, 2018Updated 8 years ago
- Validate proxies for specific domain☆38Aug 14, 2021Updated 4 years ago
- Simple Recon is just a simple bash script to automate my recon process.☆27May 12, 2021Updated 4 years ago
- WP-Hunter is a WordPress plugin/theme reconnaissance and static analysis (SAST) tool. It is designed for security researchers to evaluate…☆37Feb 27, 2026Updated last week
- ☆14Dec 11, 2025Updated 2 months ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 7 years ago
- a collection of profiles for macOS designed for penetration testing or red teaming☆38Apr 15, 2019Updated 6 years ago
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46May 31, 2023Updated 2 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆43Feb 6, 2019Updated 7 years ago
- ☆14Jul 26, 2017Updated 8 years ago
- A .NET binary loader that bypasses AMSI☆45Sep 20, 2021Updated 4 years ago
- PowerShell script to disable NetBIOS on Windows☆12Jul 19, 2021Updated 4 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Tool support for literature review subtle process.☆18May 5, 2017Updated 8 years ago
- Cookiecutter template for creating Ansible roles. Includes tests for TravisCI using Molecule.☆13Dec 14, 2021Updated 4 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Apr 13, 2020Updated 5 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- Wraps projectdiscovery's cdncheck library to exclude CDN hosts from input passed over stdin☆45Mar 13, 2023Updated 2 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Dec 5, 2019Updated 6 years ago
- Various scripts & tools☆12Apr 22, 2024Updated last year
- Distributed phishing framework designed to streamline offensive security phishing☆41Feb 16, 2023Updated 3 years ago