rollinz007 / ksprayLinks
A utility for password spraying using kerberos from an untrusted/non-domain joined Kali linux host. Useful for user and KDC/DC enumeration as well.
☆19Updated last year
Alternatives and similar repositories for kspray
Users that are interested in kspray are comparing it to the libraries listed below
Sorting:
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- ☆82Updated 5 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆40Updated 7 years ago
- ☆17Updated 7 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 6 years ago
- Custom scripts used during the scenario☆21Updated 4 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆50Updated 7 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 10 years ago
- Miscellaneous for various things☆21Updated 8 months ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Updated 8 years ago
- Plugins for the Serpico Project☆23Updated 6 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆67Updated 6 years ago
- Password spraying script and helper for creating password lists☆34Updated 4 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Updated 6 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆67Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- ☆41Updated 7 years ago
- Collection of rules and debug data for hashcat☆19Updated 8 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Updated 5 years ago
- One-off scripts☆52Updated 7 years ago
- ☆33Updated 3 years ago
- A parser to extract information from .nessus file format☆23Updated 4 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆33Updated 5 years ago