snovvcrash / PCredz
This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.
☆16Updated 2 years ago
Alternatives and similar repositories for PCredz:
Users that are interested in PCredz are comparing it to the libraries listed below
- Modified version of PEAS client for offensive operations☆38Updated 2 years ago
- ☆24Updated 3 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- ☆2Updated last month
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated 3 months ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆15Updated last year
- Discord C2 Profile for Mythic☆26Updated 9 months ago
- Citrix Phishlet☆22Updated 3 years ago
- ☆21Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆14Updated last year
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆28Updated 3 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆31Updated 2 years ago
- Scripts to interact with Microsoft Graph APIs☆33Updated 2 months ago
- ☆13Updated 3 weeks ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆27Updated last year
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- A swiss army knife for pentesting networks☆24Updated 2 years ago
- wsnet☆24Updated this week
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆23Updated 2 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- ☆31Updated 4 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆11Updated 3 years ago
- My BloodHound custom queries☆23Updated 2 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆48Updated 2 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆13Updated 2 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆20Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆71Updated last year