Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.
☆49Apr 9, 2019Updated 6 years ago
Alternatives and similar repositories for CredCatch
Users that are interested in CredCatch are comparing it to the libraries listed below
Sorting:
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Apr 10, 2019Updated 6 years ago
- A tool to generate email addresses from LinkedIn using google dorking.☆46Oct 3, 2018Updated 7 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- ProxyDock is a Dockerfile and Bash script that converts your OpenVPN files into local proxies.☆134Feb 20, 2020Updated 6 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- ☆15Aug 28, 2014Updated 11 years ago
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- A badass grabbing tool for getting PDF's of books.☆26Aug 23, 2018Updated 7 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Jun 26, 2021Updated 4 years ago
- Small scripts to assist in pentesting☆19Feb 2, 2021Updated 5 years ago
- A simple little Python script that uses Impacket to check if SMBv1 is enabled on a remote host☆16Mar 9, 2017Updated 9 years ago
- Reverse engineers GQL Schema and generates template payloads☆46Apr 5, 2019Updated 6 years ago
- ☆17Apr 4, 2015Updated 10 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- Executes lateral movement through PowerPoint DCOM objects☆20Feb 3, 2018Updated 8 years ago
- Exploits for some of the vulnerabilities I have discovered☆19Aug 3, 2020Updated 5 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- Nessus Vulnerability Scanner in a Docker container☆10Sep 25, 2018Updated 7 years ago
- A simple python library to interact with Microsoft Graph and Office 365 API☆17Dec 13, 2018Updated 7 years ago
- A simple email generator that uses dorks on Bing to generate emails from LinkedIn Profiles.☆151Oct 19, 2022Updated 3 years ago
- ☆43Jun 4, 2014Updated 11 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆12Mar 14, 2018Updated 8 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14May 29, 2018Updated 7 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆12Apr 22, 2018Updated 7 years ago
- A collection of scripts that I've written while pentesting.☆31Aug 3, 2018Updated 7 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Jun 19, 2018Updated 7 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- Clean public password dump files and store in ELK☆36Jan 24, 2018Updated 8 years ago
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Dec 8, 2017Updated 8 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Information Gathering Tool☆24Aug 16, 2013Updated 12 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Oct 13, 2022Updated 3 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- (Unofficial) Python API for http://netcraft.com☆15Jul 6, 2016Updated 9 years ago
- .NET 4.0 Fast Directory / File Lister☆27Sep 25, 2020Updated 5 years ago
- Exploiting Android Devices Running Insecure Remote ADB Service☆20Aug 25, 2018Updated 7 years ago