quentinhardy / LaZagneLinks
Credentials recovery project
☆11Updated 10 years ago
Alternatives and similar repositories for LaZagne
Users that are interested in LaZagne are comparing it to the libraries listed below
Sorting:
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Updated 8 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆53Updated last year
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 8 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆32Updated 9 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆54Updated 7 years ago
- A relatively flexible tool to parse mimikatz output☆35Updated 9 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆47Updated 8 years ago
- ☆51Updated 11 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- Automatically parses and attacks BloodHound-generated graphs☆42Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- ☆11Updated 8 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in p…☆11Updated 5 years ago
- Nashorn Post Exploitation☆32Updated 7 years ago
- Windows privilege escalation through NTLM Relay and NBNS Spoofing☆52Updated 9 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 6 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆15Updated 6 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Updated 6 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆82Updated 8 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Updated 8 years ago
- Enumerate RIDs using pure Python☆33Updated last year
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 5 years ago
- ☆46Updated 8 years ago
- Oracle Database 12c password brute forcer☆29Updated 10 years ago
- Automated install process for Phishing Frenzy☆23Updated 11 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- Data exfiltration using reflective DNS resolution covert channel☆53Updated 7 years ago