quentinhardy / LaZagneLinks
Credentials recovery project
☆10Updated 10 years ago
Alternatives and similar repositories for LaZagne
Users that are interested in LaZagne are comparing it to the libraries listed below
Sorting:
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆108Updated 7 years ago
- Windows privilege escalation through NTLM Relay and NBNS Spoofing☆52Updated 9 years ago
- Nashorn Post Exploitation☆32Updated 7 years ago
- One-off scripts☆52Updated 8 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- A relatively flexible tool to parse mimikatz output☆35Updated 8 years ago
- ☆58Updated 8 years ago
- PowerShell module to play with Kerberos S4U extensions☆52Updated 8 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆52Updated last year
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆80Updated 8 years ago
- ☆54Updated 8 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆32Updated last year
- ☆51Updated 11 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in p…☆10Updated 5 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 7 years ago
- ☆47Updated 9 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- ☆46Updated 7 years ago
- ☆50Updated 7 years ago
- Enumerate RIDs using pure Python☆32Updated last year
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Updated 7 years ago
- Data exfiltration using reflective DNS resolution covert channel☆53Updated 7 years ago
- Empire HTTP(S) C2 redirector setup script☆47Updated 7 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆32Updated 4 years ago
- ☆29Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 7 years ago