pentestpartners / mykaliView external linksLinks
Linux setup tool for Kali Linux
☆80Sep 6, 2018Updated 7 years ago
Alternatives and similar repositories for mykali
Users that are interested in mykali are comparing it to the libraries listed below
Sorting:
- This tool is embeds an android application with a msfvenom payload by using a embed ruby script it's just make the embeding more easier a…☆11May 3, 2017Updated 8 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- A very fast network scanner of SSL server configurations☆11Mar 28, 2016Updated 9 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆70Jul 26, 2018Updated 7 years ago
- ☆95Oct 19, 2022Updated 3 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Nov 18, 2024Updated last year
- Plugins for the Serpico Project☆23Dec 4, 2018Updated 7 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 7 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- interact with HackTheBox from your terminal☆24Jul 24, 2019Updated 6 years ago
- Ingest openldap data into bloodhound☆81Apr 1, 2021Updated 4 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆22Aug 20, 2019Updated 6 years ago
- Windows privilege escalation workstation☆17Nov 22, 2015Updated 10 years ago
- Scans SMB for Vuln Assessment☆17Mar 4, 2017Updated 8 years ago
- an asynchronous target enumeration tool☆245Dec 8, 2022Updated 3 years ago
- A C# implementation of the PowerShell Empire Agent☆74Apr 22, 2019Updated 6 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆19Jun 8, 2017Updated 8 years ago
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Jan 18, 2022Updated 4 years ago
- One line PS scripts that may come handy during your network assesment☆79Mar 8, 2020Updated 5 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Dec 19, 2023Updated 2 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- Test if an antivirus is installed via the resolution of the service virtual SID☆56Jan 24, 2020Updated 6 years ago
- Tool aided persistence via Windows URI schemes abuse☆84Mar 1, 2020Updated 5 years ago
- Packaging audit toolkit using vulners.com vulnerability database☆20Apr 9, 2018Updated 7 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- A relatively flexible tool to parse mimikatz output☆35Oct 11, 2016Updated 9 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 4 years ago
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆179Oct 21, 2018Updated 7 years ago
- ☆182Feb 21, 2022Updated 3 years ago
- CLI tool for PKCS7 padding oracle attacks☆142Feb 25, 2021Updated 4 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆199Nov 19, 2017Updated 8 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- Dump stuff without touching disk☆164Oct 29, 2020Updated 5 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Tool for analysts to perform simultaneous lookups (IP, Domain, URL, MD5) against multiple data sources☆29Jan 27, 2017Updated 9 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Jan 5, 2022Updated 4 years ago