☆76May 23, 2024Updated last year
Alternatives and similar repositories for apostille
Users that are interested in apostille are comparing it to the libraries listed below
Sorting:
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- A Qemu Proxmox Template builder project using Packer☆72Dec 5, 2025Updated 3 months ago
- Domain user enumeration tool☆216Nov 2, 2023Updated 2 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆244Feb 3, 2025Updated last year
- ☆30Jul 17, 2018Updated 7 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 8 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆37Aug 30, 2018Updated 7 years ago
- ☆182Feb 21, 2022Updated 4 years ago
- Evil client portion of EAP relay attack☆214Jul 5, 2023Updated 2 years ago
- Script for generating hostapd-wpe configuration files and spoofed certificates☆46Feb 8, 2017Updated 9 years ago
- ☆41May 16, 2018Updated 7 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Jun 28, 2020Updated 5 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Aug 18, 2020Updated 5 years ago
- ☆59May 1, 2019Updated 6 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- Make Windows LNK file with python (pylnk)☆64Jun 4, 2016Updated 9 years ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆21May 1, 2023Updated 2 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 8 years ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- linikatz is a tool to attack AD on UNIX☆595Oct 19, 2023Updated 2 years ago
- Issues to consider when planning a red team exercise.☆15Aug 22, 2017Updated 8 years ago
- ☆29Oct 17, 2018Updated 7 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆70Jul 26, 2018Updated 7 years ago
- ADSI based SA tool☆17Apr 9, 2022Updated 3 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Nov 13, 2018Updated 7 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Dec 4, 2015Updated 10 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆19Aug 19, 2016Updated 9 years ago
- Liniaal - A communication extension to Ruler☆99Aug 22, 2018Updated 7 years ago
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆381Jul 25, 2019Updated 6 years ago
- Burp Suite extension to perform Kerberos authentication☆106Jun 28, 2024Updated last year
- Enumerate RIDs using pure Python☆32Jan 5, 2026Updated last month
- Secure and log *available* activities in your Microsoft Office 365 environment☆40Aug 21, 2018Updated 7 years ago