quentinhardy / TPX-Brute
z/OS Mainframe TPX panel account enumerator and brute forcer
☆18Updated 7 years ago
Alternatives and similar repositories for TPX-Brute
Users that are interested in TPX-Brute are comparing it to the libraries listed below
Sorting:
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago
- Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass☆14Updated 4 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆15Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 10 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆53Updated last year
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- ☆12Updated 9 months ago
- Converts a command to a base64 powershell compatible string☆26Updated 10 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆17Updated 8 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- ☆17Updated 6 years ago
- Collection of things I've written on pentests to make life easier.☆16Updated 6 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- ☆20Updated 5 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- Random code snippets☆10Updated last year
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆32Updated 6 years ago
- Screenshot Shenanigans☆26Updated 7 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- ☆30Updated 6 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 8 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago