Bruteforce Keepass databases (KDBX 4.x format)
☆140Jul 16, 2024Updated last year
Alternatives and similar repositories for keepass4brute
Users that are interested in keepass4brute are comparing it to the libraries listed below
Sorting:
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- CVE-2023-46818 IPSConfig Python exploit☆17Oct 8, 2024Updated last year
- Kerberoast with ACL abuse capabilities☆619Dec 16, 2024Updated last year
- An utility to download PDB files associated with a Portable Executable (PE).☆15Feb 18, 2025Updated last year
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated last month
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- eval() Exploit POC for Searchor 2.4.2 and lower☆11Apr 10, 2023Updated 2 years ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆17Sep 11, 2024Updated last year
- Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604)☆17Aug 2, 2024Updated last year
- ☆42Sep 30, 2024Updated last year
- ☆184May 29, 2023Updated 2 years ago
- Impacket pre-compiled binaries☆18Jul 31, 2023Updated 2 years ago
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 10 months ago
- Decrypt mRemoteNG passwords☆66May 10, 2022Updated 3 years ago
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆248Mar 2, 2026Updated last week
- ☆50May 12, 2021Updated 4 years ago
- Top hashpwn rules☆20Dec 12, 2025Updated 2 months ago
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆40Jun 17, 2024Updated last year
- LimeSurvey Authenticated RCE☆23Jul 16, 2023Updated 2 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆3,406Feb 28, 2026Updated last week
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- Python Exploitation Framework☆30Updated this week
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,354Sep 22, 2025Updated 5 months ago
- In-depth ldap enumeration utility☆564Updated this week
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆155Jan 3, 2026Updated 2 months ago
- Username tools for penetration testing☆1,334Sep 20, 2024Updated last year
- A collection of tools that I use in CTF's or for assessments☆108Feb 2, 2025Updated last year
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- This is to reorganize my notes☆10Apr 26, 2021Updated 4 years ago
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 5 months ago
- CVE-2020-7384☆10Feb 7, 2021Updated 5 years ago
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- Multiplayer pivoting solution☆489Updated this week
- Grafana RCE exploit (CVE-2024-9264)☆39Oct 21, 2024Updated last year
- AD ACL abuse☆391Sep 11, 2025Updated 5 months ago
- ☆171Oct 21, 2025Updated 4 months ago
- ☆257Feb 17, 2023Updated 3 years ago
- Tools for Kerberos PKINIT and relaying to AD CS☆882Jan 3, 2025Updated last year