sectroyer / cyphermapLinks
A tool for mapping cypher databases
☆16Updated 2 years ago
Alternatives and similar repositories for cyphermap
Users that are interested in cyphermap are comparing it to the libraries listed below
Sorting:
- Impacket is a collection of Python classes for working with network protocols.☆74Updated 10 months ago
- POC for CVE-2021-41091☆65Updated 2 years ago
- generate payloads that force authentication against an attacker machine☆108Updated 2 years ago
- ☆146Updated 2 years ago
- A webshell plugin and interactive shell for pentesting a WordPress website.☆90Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆284Updated 6 months ago
- A cheatsheet for NetExec☆132Updated last month
- Precompiled executable☆60Updated 4 months ago
- Aspx reverse shell☆110Updated 5 years ago
- SeImpersonate privilege escalation tool for Windows 8 - 11 and Windows Server 2012 - 2022 with extensive PowerShell and .NET reflection s…☆376Updated last year
- SSTI Payload Generator☆91Updated 2 years ago
- Script to retrieve the master password of a keepass database <= 2.53.1☆105Updated last year
- Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.☆126Updated 2 years ago
- ☆35Updated last year
- AD ACL abuse☆331Updated 3 months ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆310Updated last year
- Password spraying tool and Bloodhound integration☆238Updated 6 months ago
- CVE-2023-2255 Libre Office☆58Updated 2 years ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆233Updated last year
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆87Updated last year
- ☆87Updated 5 years ago
- ☆120Updated 2 years ago
- Multiplayer pivoting solution☆402Updated last week
- Python tool for enumerating directories and files on web servers that contain a publicly readable .ds_store file.☆62Updated 3 years ago
- ☆88Updated 3 months ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆23Updated 5 months ago
- A collection of code snippets built to assist with breaking chains.☆118Updated last year
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆166Updated 4 months ago
- Powershell script to extract information from boot PXE☆145Updated 6 years ago
- CVE-2024-3400 Palo Alto OS Command Injection☆160Updated last year