r3nt0n / keepass4bruteView external linksLinks
Bruteforce Keepass databases (KDBX 4.x format)
☆137Jul 16, 2024Updated last year
Alternatives and similar repositories for keepass4brute
Users that are interested in keepass4brute are comparing it to the libraries listed below
Sorting:
- Webmin 1.910 - Remote Code Execution Using Python Script☆11Feb 6, 2024Updated 2 years ago
- CVE-2023-46818 IPSConfig Python exploit☆17Oct 8, 2024Updated last year
- Kerberoast with ACL abuse capabilities☆603Dec 16, 2024Updated last year
- An utility to download PDB files associated with a Portable Executable (PE).☆15Feb 18, 2025Updated 11 months ago
- Yescrypt Hash Cracker☆14Jan 13, 2026Updated last month
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- eval() Exploit POC for Searchor 2.4.2 and lower☆11Apr 10, 2023Updated 2 years ago
- Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604)☆16Aug 2, 2024Updated last year
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆17Sep 11, 2024Updated last year
- ☆42Sep 30, 2024Updated last year
- ☆179May 29, 2023Updated 2 years ago
- Impacket pre-compiled binaries☆18Jul 31, 2023Updated 2 years ago
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 9 months ago
- Decrypt mRemoteNG passwords☆65May 10, 2022Updated 3 years ago
- ☆48May 12, 2021Updated 4 years ago
- Top hashpwn rules☆21Dec 12, 2025Updated 2 months ago
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆40Jun 17, 2024Updated last year
- LimeSurvey Authenticated RCE☆23Jul 16, 2023Updated 2 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆3,385Dec 3, 2025Updated 2 months ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆151Jan 3, 2026Updated last month
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,328Sep 22, 2025Updated 4 months ago
- In-depth ldap enumeration utility☆555Updated this week
- ☆164Oct 21, 2025Updated 3 months ago
- Username tools for penetration testing☆1,308Sep 20, 2024Updated last year
- A collection of tools that I use in CTF's or for assessments☆108Feb 2, 2025Updated last year
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- This is to reorganize my notes☆10Apr 26, 2021Updated 4 years ago
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 4 months ago
- CVE-2020-7384☆10Feb 7, 2021Updated 5 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Multiplayer pivoting solution☆485Nov 3, 2025Updated 3 months ago
- AD ACL abuse☆385Sep 11, 2025Updated 5 months ago
- Grafana RCE exploit (CVE-2024-9264)☆38Oct 21, 2024Updated last year
- Tools for Kerberos PKINIT and relaying to AD CS☆876Jan 3, 2025Updated last year
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆240Mar 6, 2025Updated 11 months ago
- Compiled Binaries for Ghostpack☆1,594Oct 24, 2024Updated last year
- generate payloads that force authentication against an attacker machine☆119Nov 6, 2022Updated 3 years ago