This is a bash script to bypass 802.1x NAC
☆101Mar 16, 2023Updated 3 years ago
Alternatives and similar repositories for NACKered
Users that are interested in NACKered are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Script collection to bypass Network Access Control (NAC, 802.1x)☆360Feb 21, 2026Updated last month
- ☆238Oct 8, 2020Updated 5 years ago
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆273Jun 13, 2023Updated 2 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- Various Cheat Sheets☆183Jun 24, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Python api for usage with cobalt strike's External C2 specification☆241Mar 22, 2023Updated 3 years ago
- Remote Desktop Protocol in Twisted Python☆26Apr 13, 2018Updated 7 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- ☆229May 10, 2018Updated 7 years ago
- My doodles as I learn C#☆76Sep 6, 2020Updated 5 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Aug 5, 2023Updated 2 years ago
- Run PowerShell command without invoking powershell.exe☆1,541Mar 23, 2023Updated 3 years ago
- DEPRECATED SharpRoast is a C# port of various PowerView's Kerberoasting functionality.☆251Sep 25, 2018Updated 7 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Digital Preservation Software (National Archives of Australia)☆38Jul 7, 2011Updated 14 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- Obtain emails using the LinkedIn Graph API☆11Oct 1, 2025Updated 6 months ago
- Bypass WiFi client isolation on Open and WPA2-PSK networks☆40Oct 14, 2025Updated 5 months ago
- ☆30Jul 17, 2018Updated 7 years ago
- A relatively flexible tool to parse mimikatz output☆35Oct 11, 2016Updated 9 years ago
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Collection of Aggressor Scripts for Cobalt Strike☆172Aug 8, 2018Updated 7 years ago
- Standalone Windows tool to automatically retrieve Sysinternals' AD Explorer search output from the ListView control and save/copy to clip…☆38Apr 12, 2016Updated 10 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Dec 17, 2021Updated 4 years ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 5 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Apr 1, 2026Updated last week
- Powershell-based Windows Security Auditing Toolbox☆574Jan 9, 2019Updated 7 years ago
- Simple Shellcode development/injection on macOS☆11Nov 6, 2017Updated 8 years ago
- Ansible playbooks to facilitate redteam stuff☆14Aug 2, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Nim version of MDSec's Parallel Syscall PoC☆124Apr 4, 2026Updated last week
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- Malicious Macro Generator☆830Apr 17, 2019Updated 6 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Jun 20, 2017Updated 8 years ago
- Windows RID Hijacking persistence technique☆179Nov 20, 2024Updated last year
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆261Aug 6, 2016Updated 9 years ago
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago