qtc-de / crypted-cookie-monsterLinks
ccm - A small python library that helps identify vulnerabilities inside of encrypted data
☆11Updated 5 years ago
Alternatives and similar repositories for crypted-cookie-monster
Users that are interested in crypted-cookie-monster are comparing it to the libraries listed below
Sorting:
- ☆108Updated 4 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- SSH spreading made easy for red teams in a hurry☆57Updated 2 years ago
- Python script to parse Keytab files for macOS or *nix (typically /etc/krb5.keytab)☆40Updated 6 years ago
- Red team oriented key finder and correlator☆21Updated last month
- Exfiltration based on custom X509 certificates☆26Updated last year
- ☆39Updated 11 months ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Updated 11 years ago
- Test if an antivirus is installed via the resolution of the service virtual SID☆56Updated 5 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- Vulnerabilities, exploits, and PoCs☆37Updated 2 months ago
- ☆59Updated 2 years ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- C# User Simulation☆33Updated 3 years ago
- CICSpwn is a tool to pentest a CICS Transaction servers on z/OS.☆86Updated 5 years ago
- Slack C2bot that executes commands and returns the output.☆47Updated 2 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 3 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆43Updated 5 years ago
- Automated 802.1x Bypass☆86Updated 5 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 6 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- Sustainable shellcode evasion☆112Updated last year
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated last year
- Simple python script for AD enumeration☆31Updated 4 years ago
- Markov-chains for linguistically-correct password cracking☆63Updated 3 years ago
- This repo is dedicated to a powerpoint exploit☆34Updated 5 years ago
- SMB Named Pipe shell☆69Updated last year