packetfocus / BurpParser
Parser to convert BURP Pro .XML to .CSV and build a Word .Docx Template
☆13Updated 2 years ago
Related projects: ⓘ
- ☆19Updated this week
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆84Updated last year
- ☆12Updated this week
- automatic scan for hackthebox☆14Updated 4 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆47Updated 3 years ago
- Pass-thru web server for traffic redirection☆24Updated 5 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆24Updated 2 years ago
- Library of sites for categorization☆24Updated 5 years ago
- A PowerShell script for performing a build review of a Windows host☆23Updated 5 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆63Updated 3 years ago
- BH Cypher Queries picked up from random places☆38Updated 5 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆84Updated last year
- A tool to password spray Jenkins instances☆51Updated 5 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆80Updated 3 months ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆16Updated 3 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆41Updated last year
- Easily serve HTTP and DNS keys for proper payload protection☆60Updated 5 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Updated 4 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆16Updated 5 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆34Updated 4 years ago
- ☆14Updated this week
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 2 years ago
- Iterative AD discovery toolkit for offensive operations☆85Updated 4 years ago
- An Ansible role for installing Cobalt Strike.☆73Updated last month
- ☆16Updated 7 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 4 years ago
- ☆55Updated 4 years ago
- Assessment_Note☆4Updated 3 years ago
- Helpful operator notes and techniques in actionable form☆16Updated last year
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆20Updated last month