rgeoghan / app-password-persistenceView external linksLinks
Using Microsoft 365 App Passwords for persistence
☆23Sep 2, 2020Updated 5 years ago
Alternatives and similar repositories for app-password-persistence
Users that are interested in app-password-persistence are comparing it to the libraries listed below
Sorting:
- Mythic Scripting PyPi package - mythic☆28Oct 10, 2025Updated 4 months ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 6 years ago
- PowerShell ETW consumer module☆31May 21, 2025Updated 8 months ago
- ☆33Feb 26, 2022Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- Burp extension that add a tab to edit Office Open XML document (xlsx,docx,pptx)☆13Nov 26, 2017Updated 8 years ago
- A simple web viewer for TruffleHog JSON output.☆19Jan 7, 2026Updated last month
- String-based secret-searching tool (high entropy and regexes) based on truffleHog☆17Oct 21, 2021Updated 4 years ago
- ☆20Jan 5, 2024Updated 2 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- A scripted library of hacking techniques.☆18Jul 18, 2018Updated 7 years ago
- Manticore Adversary Emulation Cli☆47Aug 4, 2020Updated 5 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- ☆18May 3, 2021Updated 4 years ago
- ☆22May 29, 2020Updated 5 years ago
- ☆52Oct 29, 2024Updated last year
- A slightly stripped down version of RID (an exercise in learning python C-Types...some of it is a little rushed/sloppy) and a stripped do…☆51Aug 21, 2012Updated 13 years ago
- ☆48May 12, 2021Updated 4 years ago
- Attempt zone transfers on domains☆18Jul 12, 2021Updated 4 years ago
- IBM RedCON 2020 - Throwing an AquaWrench into the Kernel☆44Aug 25, 2020Updated 5 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Mar 25, 2020Updated 5 years ago
- Jekyll Files for cloudsecwiki.com☆49Sep 16, 2021Updated 4 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- Zone transfers for rwhois☆20Feb 27, 2019Updated 6 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆26Sep 30, 2020Updated 5 years ago
- A BurpSuite plugin for BBRF☆25Nov 17, 2024Updated last year
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 4 years ago
- ☆56Aug 19, 2024Updated last year
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆167Mar 30, 2025Updated 10 months ago
- Red Team Automation tool powered by go and terraform☆33May 26, 2021Updated 4 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Jun 11, 2021Updated 4 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 3 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Jun 26, 2020Updated 5 years ago
- Alphanumeric Encoder☆25Oct 10, 2018Updated 7 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Apr 11, 2023Updated 2 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Sep 15, 2023Updated 2 years ago
- Using syscall to load shellcode, Evasion techniques☆27Jul 18, 2021Updated 4 years ago
- ☆10Feb 5, 2026Updated last week