s0lst1c3 / silentbridge
Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.
☆242Updated last year
Related projects ⓘ
Alternatives and complementary repositories for silentbridge
- ☆232Updated 4 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆62Updated 2 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆182Updated 4 years ago
- Script collection to bypass Network Access Control (NAC, 802.1x)☆274Updated last month
- This is a bash script to bypass 802.1x NAC☆95Updated last year
- Easy 802.1Q VLAN Hopping☆365Updated 8 years ago
- Kerberoast attack -pure python-☆421Updated 11 months ago
- Evil client portion of EAP relay attack☆191Updated last year
- Malicious WMI Events using PowerShell☆370Updated 8 years ago
- A framework for stealthy domain reconnaissance☆293Updated 3 years ago
- Chameleon: A tool for evading Proxy categorisation☆460Updated 2 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆212Updated last year
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆245Updated 5 months ago
- LDAP library for auditing MS AD☆366Updated 2 months ago
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆185Updated 4 months ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆251Updated 3 years ago
- Password decryption tool for the McAfee SiteList.xml file☆124Updated 7 months ago
- This is a weaponized WSUS exploit☆281Updated last year
- ☆279Updated 6 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆329Updated 5 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆138Updated 3 years ago
- Active Directory ACL exploitation with BloodHound☆703Updated 3 years ago
- Weaponizing Splunk with reverse and bind shells.☆174Updated 7 years ago
- Generates malicious LNK file payloads for data exfiltration☆348Updated 7 years ago
- NTLMv1 Multitool☆590Updated last month
- Tool to extract Kerberos tickets from Linux kernel keys.☆217Updated 5 years ago
- ☆513Updated 2 years ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆127Updated 8 months ago