quentinhardy / LaZagneLinks
Credentials recovery project
☆10Updated 10 years ago
Alternatives and similar repositories for LaZagne
Users that are interested in LaZagne are comparing it to the libraries listed below
Sorting:
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆108Updated 8 years ago
- A relatively flexible tool to parse mimikatz output☆35Updated 9 years ago
- Nashorn Post Exploitation☆32Updated 7 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆52Updated last year
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 8 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- ☆11Updated 8 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 5 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆54Updated 7 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Updated 7 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 11 years ago
- ☆51Updated 11 years ago
- Dockerized version of Sn1per (https://github.com/1N3/Sn1per)☆60Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Data exfiltration using reflective DNS resolution covert channel☆53Updated 7 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆32Updated 9 years ago
- Enumerate RIDs using pure Python☆32Updated last year
- Scan for open S3 buckets and dump☆38Updated 7 years ago
- ☆46Updated 8 years ago
- Windows privilege escalation through NTLM Relay and NBNS Spoofing☆52Updated 9 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Updated 7 years ago
- ☆30Updated 6 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- ☆44Updated 9 years ago
- Empire HTTP(S) C2 redirector setup script☆48Updated 7 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆62Updated 8 years ago