This is a bash script to bypass 802.1x NAC
☆100Mar 16, 2023Updated 2 years ago
Alternatives and similar repositories for NACKered
Users that are interested in NACKered are comparing it to the libraries listed below
Sorting:
- Script collection to bypass Network Access Control (NAC, 802.1x)☆345Feb 21, 2026Updated 2 weeks ago
- ☆237Oct 8, 2020Updated 5 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆270Jun 13, 2023Updated 2 years ago
- My doodles as I learn C#☆76Sep 6, 2020Updated 5 years ago
- Remote Desktop Protocol in Twisted Python☆26Apr 13, 2018Updated 7 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Various Cheat Sheets☆183Jun 24, 2021Updated 4 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Apr 20, 2018Updated 7 years ago
- Python api for usage with cobalt strike's External C2 specification☆241Mar 22, 2023Updated 2 years ago
- Digital Preservation Software (National Archives of Australia)☆38Jul 7, 2011Updated 14 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- ☆229May 10, 2018Updated 7 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- Bypass WiFi client isolation on Open and WPA2-PSK networks☆40Oct 14, 2025Updated 4 months ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- DEPRECATED SharpRoast is a C# port of various PowerView's Kerberoasting functionality.☆251Sep 25, 2018Updated 7 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- Run PowerShell command without invoking powershell.exe☆1,534Mar 23, 2023Updated 2 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Nov 13, 2018Updated 7 years ago
- Standalone Windows tool to automatically retrieve Sysinternals' AD Explorer search output from the ListView control and save/copy to clip…☆38Apr 12, 2016Updated 9 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆19Aug 19, 2016Updated 9 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Oct 28, 2019Updated 6 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Dec 4, 2020Updated 5 years ago
- Windows RID Hijacking persistence technique☆178Nov 20, 2024Updated last year
- Collection of Aggressor Scripts for Cobalt Strike☆172Aug 8, 2018Updated 7 years ago
- Domain user enumeration tool☆216Nov 2, 2023Updated 2 years ago
- Malicious Macro Generator☆830Apr 17, 2019Updated 6 years ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 5 years ago
- ☆210Jan 30, 2019Updated 7 years ago
- Nim version of MDSec's Parallel Syscall PoC☆124Jan 14, 2022Updated 4 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆634Jun 20, 2017Updated 8 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Dec 17, 2021Updated 4 years ago
- locate and attack Lync/Skype for Business☆345Oct 1, 2024Updated last year