rapid7 / mimikatz
A little tool to play with Windows security
☆47Updated 7 months ago
Related projects: ⓘ
- One line PS scripts that may come handy during your network assesment☆72Updated 4 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆73Updated 10 years ago
- ☆35Updated 8 years ago
- ☆59Updated 4 years ago
- SMBMap is a handy SMB enumeration tool☆35Updated 3 months ago
- A collection of data exfiltration scripts for Red Team assessments.☆91Updated 4 years ago
- Tool for password spraying RDP☆91Updated 5 years ago
- ☆50Updated 5 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆170Updated last year
- Conveigh is a Windows PowerShell LLMNR/NBNS spoofer detection tool☆91Updated 8 years ago
- Search drives for documents containing passwords☆61Updated 10 years ago
- ☆55Updated this week
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆35Updated 5 years ago
- ☆52Updated 10 years ago
- A collection of modifed PowerShell Scripts for CrackMapExec (https://github.com/byt3bl33d3r/CrackMapExec)☆48Updated 5 years ago
- Customized Kali Linux - Ansible playbook☆64Updated 3 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆56Updated 2 years ago
- Brute-force Cisco SSL VPN☆54Updated 4 years ago
- Password spraying script and helper for creating password lists☆33Updated 4 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆48Updated last year
- SSH User Enumeration Script in Python Using The Timing Attack☆91Updated 8 years ago
- Simple parser framework.☆23Updated last year
- AvBuster The stress Tester for your Anti Malware solutions☆42Updated 3 years ago
- A dockerized, improved version of the Impacket smbserver.py☆38Updated 5 years ago
- Domain user enumeration tool☆212Updated 10 months ago
- ☆40Updated 8 years ago
- ☆75Updated 11 months ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆97Updated 6 years ago
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆56Updated 5 years ago
- Metasploit automation. Why work when a minion can do it?☆21Updated 7 years ago