Bruteforce Keepass databases (KDBX 4.x format)
☆151Jul 16, 2024Updated last year
Alternatives and similar repositories for keepass4brute
Users that are interested in keepass4brute are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- Kerberoast with ACL abuse capabilities☆634Dec 16, 2024Updated last year
- CVE-2023-46818 IPSConfig Python exploit☆17Oct 8, 2024Updated last year
- Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a s…☆61Feb 23, 2026Updated last month
- Pentest report framework without data send☆19Sep 23, 2025Updated 6 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604)☆17Aug 2, 2024Updated last year
- Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)☆15Feb 25, 2021Updated 5 years ago
- Repository for tools used for the OSCP☆24Sep 18, 2025Updated 7 months ago
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- CVE-2020-7384☆10Feb 7, 2021Updated 5 years ago
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆265Mar 2, 2026Updated last month
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆17Sep 11, 2024Updated last year
- eval() Exploit POC for Searchor 2.4.2 and lower☆11Apr 10, 2023Updated 3 years ago
- ☆189May 29, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆40Jun 17, 2024Updated last year
- Grafana RCE exploit (CVE-2024-9264)☆39Oct 21, 2024Updated last year
- An utility to download PDB files associated with a Portable Executable (PE).☆15Feb 18, 2025Updated last year
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated 3 months ago
- Find and collect parts of a Keepass master key to recover it in plain text from a memory dump☆20Feb 1, 2024Updated 2 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆3,465Feb 28, 2026Updated last month
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆370Feb 12, 2024Updated 2 years ago
- Precompiled binaries for various projects☆13Nov 6, 2020Updated 5 years ago
- Python version of the C# tool for "Shadow Credentials" attacks☆876Feb 14, 2026Updated 2 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆43Sep 30, 2024Updated last year
- ☆124Nov 16, 2022Updated 3 years ago
- Exploiting the xmlrpc.php on all WordPress versions☆26Nov 4, 2022Updated 3 years ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆162Jan 3, 2026Updated 3 months ago
- ☆186Oct 21, 2025Updated 5 months ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,379Sep 22, 2025Updated 6 months ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 8 months ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 4 months ago
- Decrypt mRemoteNG passwords☆67May 10, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- LimeSurvey Authenticated RCE☆24Jul 16, 2023Updated 2 years ago
- PoC for CVE-2022-23940☆12May 7, 2025Updated 11 months ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- Reverse Shell Exploit for Searchor <= 2.4.2 (2.4.0)☆17May 27, 2023Updated 2 years ago
- This is to reorganize my notes☆10Apr 26, 2021Updated 4 years ago
- Tools for Kerberos PKINIT and relaying to AD CS☆890Jan 3, 2025Updated last year
- AD ACL abuse☆396Sep 11, 2025Updated 7 months ago