ricardojba / noPacLinks
CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.
☆36Updated 3 years ago
Alternatives and similar repositories for noPac
Users that are interested in noPac are comparing it to the libraries listed below
Sorting:
- An async Python client library for Empire's RESTful API☆25Updated last year
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- ☆12Updated 4 years ago
- LAPS module for CrackMapExec☆29Updated 3 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆30Updated 3 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆32Updated 4 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- ☆53Updated 4 years ago
- PetitPotam fork with Kerberos support in the impacket script☆17Updated 3 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Updated last year
- ☆32Updated 5 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 3 years ago
- ☆23Updated 3 years ago
- Service Enumeration C# .NET Assembly☆58Updated 3 years ago
- ☆17Updated 4 years ago
- ☆41Updated 6 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Updated 4 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24Updated 3 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Updated 5 years ago
- ☆25Updated 3 years ago
- An Ansible role to install cobalt-strike☆16Updated 4 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15Updated 4 years ago
- D/Invoke port of UrbanBishop☆29Updated 4 years ago
- Microsoft365 Device Code Phishing Framework☆37Updated 3 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- RDP Checker☆63Updated last year
- ☆70Updated 4 years ago