nccgroup / dapr
Driver Attack Platform for Linux
☆18Updated 2 years ago
Alternatives and similar repositories for dapr:
Users that are interested in dapr are comparing it to the libraries listed below
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Provides access to libhashcat☆30Updated last year
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Updated 5 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- ARP Man-in-the-Middle tool☆29Updated 4 months ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Updated 4 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 8 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 9 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆33Updated 5 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- Directory/file & DNS busting tool written in Go☆14Updated 5 years ago
- This is a beginner level session to train you into using SSH more effectively. While pentesters may benefit (especially if they are plan…☆15Updated 6 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 5 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 7 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- Periodically check hashcat cracking progress and notify of success.☆11Updated 6 years ago
- Tools for auditing WAFS☆19Updated 3 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago