skelsec / sprayit
Password spraying toolkit
☆7Updated 4 years ago
Alternatives and similar repositories for sprayit:
Users that are interested in sprayit are comparing it to the libraries listed below
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆13Updated 2 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 2 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Updated 3 years ago
- C# code to run PIC using CreateThread☆16Updated 5 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆9Updated 3 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- module for certexfil☆15Updated 2 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆25Updated 4 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆13Updated 7 years ago
- Obtain and parse SSL certificates☆9Updated 2 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- Execute Shellcode And Other Goodies From MMC☆12Updated 9 years ago
- Firebase Domain Front Code☆21Updated 3 years ago
- Compiled Binaries for Sharp Suite☆13Updated 5 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆19Updated 4 years ago
- A tool to sync mythic events with ghostwriter oplog.☆12Updated last month
- ☆12Updated 2 years ago
- Kibana app for RedELK☆16Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- D/Invoke port of UrbanBishop☆29Updated 4 years ago
- ☆14Updated 4 years ago
- Red Team C2 and Post Exploitation Code☆36Updated 3 weeks ago