paranoidninja / piBorg
This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by attaching it to a Switch and creating a WPAD Proxy Server.
☆22Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for piBorg
- ☆24Updated 6 years ago
- ☆17Updated 7 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 9 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- Useful Windows and AD tools☆15Updated 2 years ago
- A PowerShell script to prevent Sysmon from writing its events☆14Updated 4 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 5 years ago
- Collection of things I've written on pentests to make life easier.☆16Updated 5 years ago
- Obtains a crackable hash for the current user account☆22Updated 5 years ago
- A multi-threaded class C network scanner. Loosely based on propecia.c by Bind.☆12Updated 10 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Updated 5 years ago
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆13Updated 6 years ago
- Asynchronous MSF RPC API wrapper☆20Updated last year
- Random code snippets☆9Updated last year
- ☆30Updated 6 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆32Updated 4 years ago
- ☆26Updated 6 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆13Updated 7 years ago
- Generates anti-sandbox analysis HTA files without payloads☆15Updated 7 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆52Updated 7 months ago
- ☆11Updated 8 years ago