net-dawg / SSHniffer
☆34Updated last year
Alternatives and similar repositories for SSHniffer:
Users that are interested in SSHniffer are comparing it to the libraries listed below
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- ☆26Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆42Updated last year
- ☆43Updated 8 months ago
- ☆51Updated 2 months ago
- Source code and examples for PassiveAggression☆55Updated 9 months ago
- Docker container for running CobaltStrike 4.10☆36Updated 5 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆37Updated last year
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆32Updated 3 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated 7 months ago
- Discord C2 Profile for Mythic☆27Updated 3 weeks ago
- A Moodle Scanner☆39Updated 3 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 9 months ago
- ☆53Updated 4 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 3 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 6 months ago
- ☆21Updated 9 months ago
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Updated last year
- ☆51Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- ☆40Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆49Updated 6 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 9 months ago
- ☆32Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆33Updated 9 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- ☆52Updated last year
- PDump is a project for dumping leaked credentials from DEHASHED☆15Updated last year