quentinhardy / TPX-BruteLinks
z/OS Mainframe TPX panel account enumerator and brute forcer
☆19Updated 7 years ago
Alternatives and similar repositories for TPX-Brute
Users that are interested in TPX-Brute are comparing it to the libraries listed below
Sorting:
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- ☆17Updated 7 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Updated 5 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆53Updated last year
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Miscellaneous for various things☆20Updated 6 months ago
- Asynchronous public DNS auditing tool☆11Updated 2 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass☆14Updated 4 years ago
- ☆12Updated 10 months ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆24Updated 6 months ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- ☆17Updated 6 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- ☆25Updated 6 years ago
- PSIKOTIK TSO User Enumerator☆17Updated 7 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 10 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Tool to acquire netNTLM hashes on a local machine wihtout network traffic☆13Updated 7 years ago
- AV Bypass☆29Updated 7 years ago
- Communicate with a remote shell easily☆12Updated 7 years ago
- ☆16Updated 10 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago