quentinhardy / LaZagneLinks
Credentials recovery project
☆10Updated 10 years ago
Alternatives and similar repositories for LaZagne
Users that are interested in LaZagne are comparing it to the libraries listed below
Sorting:
- A relatively flexible tool to parse mimikatz output☆35Updated 8 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in p…☆9Updated 5 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆53Updated last year
- Mimikatz HashClash☆12Updated 10 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- Scan for open S3 buckets and dump☆37Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Updated 7 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Data exfiltration using reflective DNS resolution covert channel☆52Updated 7 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 8 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- ☆41Updated 6 years ago
- Nashorn Post Exploitation☆32Updated 7 years ago
- Scan for OSGi Consoles☆21Updated last year
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- ☆30Updated 6 years ago
- Socks5 server over Websockets☆40Updated 6 years ago
- ☆20Updated 5 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 7 years ago
- Empire HTTP(S) C2 redirector setup script☆47Updated 6 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- CVE-2017-8570 Exploit☆21Updated 7 years ago
- Custom stagers with python encrypting proxy☆39Updated 10 years ago
- ☆19Updated 8 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 6 years ago
- ☆47Updated 9 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 7 years ago