overgrowncarrot1 / SMB_KillerView external linksLinks
Used to get NTLMv2 Hashes from SMB
☆23Oct 24, 2024Updated last year
Alternatives and similar repositories for SMB_Killer
Users that are interested in SMB_Killer are comparing it to the libraries listed below
Sorting:
- ☆11Feb 6, 2023Updated 3 years ago
- Hack The Box CPTS command☆30Jun 25, 2025Updated 7 months ago
- Pentesting Apache Tomcat 101☆14Apr 4, 2023Updated 2 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- HackTheBox: Certified Bug Bounty Hunter's Writeup by Hung Thinh Tran☆13May 27, 2023Updated 2 years ago
- My OSCP notes. Might help you! Happy to get feedback to improve this package.☆23Jun 24, 2025Updated 7 months ago
- Wayfiles is a tool designed to search for juicy files and URLs within a folder/file with results of tools like gau, waymore, waybackurls,…☆16Jan 30, 2024Updated 2 years ago
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆44Oct 29, 2023Updated 2 years ago
- A Next-Gen Wordpress Hacker Backend☆19May 27, 2018Updated 7 years ago
- AzureAD Pentest☆25Mar 24, 2022Updated 3 years ago
- ☆45Nov 5, 2023Updated 2 years ago
- ☆21Oct 24, 2018Updated 7 years ago
- Config files for my GitHub profile.☆18Apr 8, 2025Updated 10 months ago
- Hidden input parameters finder☆19Jul 10, 2023Updated 2 years ago
- ☆42Mar 13, 2025Updated 11 months ago
- ☆65Jul 12, 2025Updated 7 months ago
- All cheetsheets with main information from HTB CBBH role path in one place.☆114Mar 20, 2024Updated last year
- Compilation of scripts/tools (made by me or not) that help me with Pentest and Bug Bounty.☆26Dec 22, 2025Updated last month
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- Ansible playbooks to install various utility and security tools to localhost☆29Aug 5, 2019Updated 6 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- Some simple scripts that I use during bug bounty hunting in Android Apps☆28Jan 30, 2025Updated last year
- SharpShareFinder is a minimalistic network share discovery POC designed to enumerate shares in Windows Active Directory networks leveragi…☆36Jul 10, 2024Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆83Jan 12, 2023Updated 3 years ago
- My notes while studying for the PNPT from TCM Security.☆81Mar 30, 2024Updated last year
- Tools I use on red team engagements and more☆33Mar 14, 2024Updated last year
- Phishing Framework for OTP codes☆47Nov 24, 2025Updated 2 months ago
- ☆14Jan 20, 2026Updated 3 weeks ago
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- My bug bounty notes☆35Apr 10, 2021Updated 4 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- xsschecker tests endpoints for reflected XSS by injecting payloads and checking responses. It prints vulnerable if the payload is reflect…☆36Nov 3, 2025Updated 3 months ago
- ☆37Oct 3, 2023Updated 2 years ago
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆40Jun 17, 2024Updated last year
- ☆38Mar 8, 2022Updated 3 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- ☆14May 14, 2022Updated 3 years ago
- ☆12Nov 23, 2025Updated 2 months ago