nnposter / nndefacctsView external linksLinks
nnposter's alternate fingerprint dataset for Nmap script http-default-accounts
☆256Feb 2, 2026Updated last week
Alternatives and similar repositories for nndefaccts
Users that are interested in nndefaccts are comparing it to the libraries listed below
Sorting:
- Login hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.☆332Nov 21, 2020Updated 5 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,130Dec 7, 2022Updated 3 years ago
- A horizontal and vertical web content enumerator☆52Aug 15, 2018Updated 7 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Converts/manipulates/extracts data from a Nmap scan output.☆550Apr 29, 2024Updated last year
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆634Jun 20, 2017Updated 8 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Dec 8, 2022Updated 3 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆372Feb 23, 2024Updated last year
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Jan 20, 2021Updated 5 years ago
- ☆264Jul 15, 2022Updated 3 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 8 years ago
- Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.☆177Sep 18, 2018Updated 7 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,551Oct 17, 2022Updated 3 years ago
- A default credential scanner.☆1,503Jul 8, 2025Updated 7 months ago
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,799Updated this week
- NTLMv1 Multitool☆662Nov 30, 2025Updated 2 months ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,131Feb 10, 2021Updated 5 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆401May 20, 2020Updated 5 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆239Dec 8, 2022Updated 3 years ago
- An Insider Threat Toolkit☆155Dec 17, 2018Updated 7 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆760Sep 23, 2024Updated last year
- ☆94Nov 16, 2018Updated 7 years ago
- ☆182Feb 21, 2022Updated 3 years ago
- A library for integrating communication channels with the Cobalt Strike External C2 server☆290Nov 23, 2017Updated 8 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Aug 7, 2020Updated 5 years ago
- A framework for stealthy domain reconnaissance☆302Oct 14, 2021Updated 4 years ago
- Robber is open source tool for finding executables prone to DLL hijacking☆785Jun 23, 2022Updated 3 years ago
- goddi (go dump domain info) dumps Active Directory domain information☆431May 31, 2022Updated 3 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆108Jul 26, 2024Updated last year
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- An example rootkit that gives a userland process root permissions☆78Oct 17, 2019Updated 6 years ago
- Checks for signature requirements over LDAP☆98Oct 11, 2022Updated 3 years ago
- Memory Backed Powershell WebDav Server☆138Mar 7, 2021Updated 4 years ago
- Domain user enumeration tool☆216Nov 2, 2023Updated 2 years ago