snovvcrash / PCredzLinks
This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.
☆19Updated 3 years ago
Alternatives and similar repositories for PCredz
Users that are interested in PCredz are comparing it to the libraries listed below
Sorting:
- A swiss army knife for pentesting networks☆26Updated 3 years ago
- ☆22Updated 2 years ago
- Modified version of PEAS client for offensive operations☆42Updated 2 years ago
- wsnet☆27Updated last month
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 7 months ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated 2 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Updated 3 years ago
- CVE-2013-4786 Go exploitation tool☆39Updated 2 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- Passworld is a fully customizable wordlist generator☆16Updated last year
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆20Updated 7 months ago
- A script to automate keystrokes through a graphical desktop program.☆34Updated 5 months ago
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆16Updated last year
- ☆27Updated 4 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Updated last month
- Discord C2 Profile for Mythic☆33Updated 8 months ago
- Microsoft365 Device Code Phishing Framework☆39Updated 4 years ago
- Pwdlyser is an all encompassing security auditing tool. This repo serves as the open-source base for the new version of Pwdlyser (previou…☆25Updated last year
- Red Team Projects with chat.openai.com.☆17Updated 2 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 10 months ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆20Updated 5 months ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year