quentinhardy / LaZagneLinks
Credentials recovery project
☆11Updated 10 years ago
Alternatives and similar repositories for LaZagne
Users that are interested in LaZagne are comparing it to the libraries listed below
Sorting:
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Updated 8 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆82Updated 8 years ago
- Windows privilege escalation through NTLM Relay and NBNS Spoofing☆52Updated 9 years ago
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- Nashorn Post Exploitation☆32Updated 7 years ago
- Automated install process for Phishing Frenzy☆24Updated 11 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 8 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆54Updated last year
- PowerShell module to play with Kerberos S4U extensions☆52Updated 8 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆47Updated 8 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 8 years ago
- Created by Jeffrey Martin via the GitHub Connector☆50Updated 10 months ago
- ☆51Updated 11 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆15Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- Data exfiltration using reflective DNS resolution covert channel☆53Updated 7 years ago
- Python version of OWASP's DirBuster Application.☆29Updated 11 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆32Updated 9 years ago
- A relatively flexible tool to parse mimikatz output☆35Updated 9 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 6 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆62Updated 8 years ago
- ☆30Updated 6 years ago
- Empire HTTP(S) C2 redirector setup script☆48Updated 7 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- ☆58Updated 8 years ago
- Imports an LDAP file from Active Directory for SQL based offline reconnisance☆55Updated 9 years ago
- ☆50Updated 8 years ago
- ☆46Updated 8 years ago