paranoidninja / piBorgLinks
This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by attaching it to a Switch and creating a WPAD Proxy Server.
☆23Updated 8 years ago
Alternatives and similar repositories for piBorg
Users that are interested in piBorg are comparing it to the libraries listed below
Sorting:
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆55Updated last year
- A cross platform tool for verifying credentials and executing single commands☆33Updated 6 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Collection of things I've written on pentests to make life easier.☆16Updated 6 years ago
- ☆17Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Updated 6 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆19Updated 8 years ago
- ☆17Updated 8 years ago
- Free Email Providers☆11Updated 2 years ago
- ☆25Updated 7 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Updated 7 years ago
- Exploits developped by Outflank B.V. team members☆21Updated 8 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 7 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆12Updated 5 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Updated 9 years ago
- ☆20Updated 5 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆22Updated 7 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Updated 6 years ago
- Assists in mass exportation of Nessus scans☆20Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 6 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Updated 5 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆40Updated 7 years ago
- A Tool for cross-platform System Enumeration☆12Updated 8 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 5 years ago