mubix / windows-declutterLinks
Windows 10 De-Clutter script
☆25Updated 5 years ago
Alternatives and similar repositories for windows-declutter
Users that are interested in windows-declutter are comparing it to the libraries listed below
Sorting:
- Password spraying on sites that require 2+ page loads and dynamic nonces☆32Updated 6 years ago
- Ansible scripts to build an attack box☆25Updated 7 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- My Python Cookiecutter project template☆32Updated 3 years ago
- Automatically spin up infra for phishing☆64Updated 5 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 6 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Updated 7 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- LetMeOutOfYour.net Resources☆20Updated 5 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆111Updated 11 months ago
- AvBuster The stress Tester for your Anti Malware solutions☆41Updated 4 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Updated 6 years ago
- ☆36Updated 5 years ago
- A dockerized, improved version of the Impacket smbserver.py☆40Updated 6 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 6 years ago
- Red Team Automation tool powered by go and terraform☆32Updated 4 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆12Updated 7 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Updated 5 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- Post-exploitation NTLM password hash extractor☆20Updated 4 years ago
- Hiding implants in HTML files☆65Updated 5 years ago
- Network Finger Printer☆16Updated 7 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- Microsoft Flow Attack Framework☆23Updated 5 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Updated 5 years ago
- Reconnaissance tool for Microsoft Office 365☆68Updated 6 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆50Updated 8 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 3 years ago