rollinz007 / ksprayLinks
A utility for password spraying using kerberos from an untrusted/non-domain joined Kali linux host. Useful for user and KDC/DC enumeration as well.
☆19Updated 2 years ago
Alternatives and similar repositories for kspray
Users that are interested in kspray are comparing it to the libraries listed below
Sorting:
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆40Updated 7 years ago
- Miscellaneous for various things☆21Updated last year
- Six Degrees of Domain Admin☆15Updated 8 years ago
- ☆17Updated 8 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38Updated 6 years ago
- ☆81Updated 6 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- One-off scripts☆52Updated 8 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 8 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆69Updated 7 years ago
- ☆37Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 3 years ago
- Custom scripts used during the scenario☆21Updated 4 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- Plugins for the Serpico Project☆23Updated 7 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Enumerate RIDs using pure Python☆32Updated last year
- ☆41Updated 7 years ago
- A tool to catch spoofed NBNS responses.☆51Updated 7 years ago
- Clean public password dump files and store in ELK☆38Updated 7 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Updated 6 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 8 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- Microsoft Flow Attack Framework☆23Updated 6 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 9 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago