A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.
☆44Apr 10, 2019Updated 7 years ago
Alternatives and similar repositories for X-Prey
Users that are interested in X-Prey are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple email generator that uses dorks on Bing to generate emails from LinkedIn Profiles.☆152Oct 19, 2022Updated 3 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆49Apr 9, 2019Updated 7 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- A tool to generate email addresses from LinkedIn using google dorking.☆46Oct 3, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 3 years ago
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- ProxyDock is a Dockerfile and Bash script that converts your OpenVPN files into local proxies.☆134Feb 20, 2020Updated 6 years ago
- ☆36Mar 11, 2019Updated 7 years ago
- ☆12Apr 21, 2019Updated 7 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- Ps1jacker is a tool for generating COM Hijacking payload.☆60Feb 11, 2025Updated last year
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 7 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- ☆37Nov 4, 2017Updated 8 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- Metasploit Framework☆11Sep 5, 2017Updated 8 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Red Team C2 Infrastructure built in AWS using Ansible!☆233Oct 4, 2020Updated 5 years ago
- PoC of injecting code into a running Linux process☆22Sep 11, 2019Updated 6 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- Windows 10 CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM☆117Dec 12, 2019Updated 6 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 8 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Ansible role to configure redirectors for red team C2☆31Nov 12, 2018Updated 7 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆53Dec 4, 2020Updated 5 years ago
- Exploits for some of the vulnerabilities I have discovered☆18Aug 3, 2020Updated 5 years ago
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- ☆20Jan 25, 2019Updated 7 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Nov 4, 2017Updated 8 years ago