skyleronken / owa_bruteLinks
Horizontal Brute Forcing tool for OWA
☆9Updated 7 years ago
Alternatives and similar repositories for owa_brute
Users that are interested in owa_brute are comparing it to the libraries listed below
Sorting:
- Useful Windows and AD tools☆15Updated 3 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Updated 6 years ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- ☆30Updated 6 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆12Updated 9 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 8 years ago
- ☆26Updated 6 years ago
- ☆25Updated 7 years ago
- SSDP Service Discovery☆17Updated 6 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Updated 6 years ago
- Mimikatz HashClash☆12Updated 10 years ago
- Protect your servers with a secret header☆29Updated 5 years ago
- ☆17Updated 6 years ago
- \ PowerAvails Powershell /☆12Updated 7 years ago
- ☆28Updated 7 years ago
- C# code to run PIC using CreateThread☆17Updated 6 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆32Updated last year
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆46Updated 8 years ago
- Forked and updated with some additional features over the original☆17Updated 4 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- ☆17Updated 7 years ago
- Removal of certain event logs within a Windows OS☆8Updated 5 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 11 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Updated 6 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- Tool to acquire netNTLM hashes on a local machine wihtout network traffic☆13Updated 7 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆33Updated 5 years ago