rollinz007 / kspray
A utility for password spraying using kerberos from an untrusted/non-domain joined Kali linux host. Useful for user and KDC/DC enumeration as well.
☆18Updated last year
Alternatives and similar repositories for kspray:
Users that are interested in kspray are comparing it to the libraries listed below
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Updated 5 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 2 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- Random Hashcat Scrips☆24Updated 4 months ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Updated 6 years ago
- Nessus Preflight(NPF) Check for local and remote systems. Essentially sets three registry keys and restarts a service to allow nessus to …☆16Updated 4 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Updated 8 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆49Updated 7 years ago
- Miscellaneous for various things☆22Updated 3 months ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Presentation Slides☆27Updated 5 years ago
- Password policies. Yuck. Luckily they make for predictable passwords.☆8Updated 7 years ago
- My pentest cheat sheet☆15Updated 7 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Updated 5 years ago
- ☆17Updated 2 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆66Updated 6 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆42Updated 4 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Updated 4 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆30Updated 8 years ago
- ☆29Updated 6 years ago
- Speeds up the extraction of password hashes from ntds.dit files. For use with the ntdsxtract project or the dshash script☆27Updated last year
- ☆17Updated 7 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆32Updated 6 years ago
- Lutech TMS EHAT-NG☆14Updated 7 years ago