snovvcrash / WeaponizeKali.shView external linksLinks
Collection of extra pentest tools for Kali Linux
☆113Sep 18, 2025Updated 4 months ago
Alternatives and similar repositories for WeaponizeKali.sh
Users that are interested in WeaponizeKali.sh are comparing it to the libraries listed below
Sorting:
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- 50+ Hacking Tools Collection☆16Sep 13, 2017Updated 8 years ago
- A swiss army knife for pentesting networks☆26Sep 3, 2022Updated 3 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Jul 29, 2022Updated 3 years ago
- Python3 tool to perform password spraying using RDP☆16Aug 14, 2023Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Dec 15, 2022Updated 3 years ago
- ☆74Jun 17, 2025Updated 7 months ago
- Automate installation of extra pentest tools on Kali Linux☆42Jan 4, 2021Updated 5 years ago
- A collection of (even more) alternative shellcode callback methods in CSharp☆81Oct 26, 2024Updated last year
- Pentester's Promiscuous Notebook☆528Feb 2, 2026Updated 2 weeks ago
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆182Aug 16, 2025Updated 6 months ago
- Generate and Manage KeyCredentialLinks☆245Jan 30, 2026Updated 2 weeks ago
- Some scripts to abuse kerberos using Powershell☆355Jul 27, 2023Updated 2 years ago
- A hacking panel based in Kali tools and more! Only with educational porpuses. The author is not responsable for any damage☆11Feb 7, 2022Updated 4 years ago
- Divide full port scan results and use it for targeted Nmap runs☆329Jul 1, 2024Updated last year
- A string obfuscator for .NET apps, built to evade static string analysis.☆111Jan 3, 2023Updated 3 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- Dynamically invoke arbitrary unmanaged code from managed code without P/Invoke.☆168Jan 25, 2024Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆171Nov 5, 2024Updated last year
- Visual Basic Code universal Obfuscator intended to be used during penetration testing assignments.☆147Dec 13, 2021Updated 4 years ago
- ☆151Oct 2, 2023Updated 2 years ago
- Scripts to set up Kali Linux with additional tools, and maintain them.☆67Dec 8, 2025Updated 2 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Aug 5, 2022Updated 3 years ago
- Remotely Enumerate sessions using undocumented Windows Station APIs☆118Aug 21, 2024Updated last year
- ☆122Oct 9, 2023Updated 2 years ago
- Sliver agents for Mythic☆48Nov 18, 2024Updated last year
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Sep 29, 2025Updated 4 months ago
- A Python POC for CRED1 over SOCKS5☆164Oct 5, 2024Updated last year
- ☆216Mar 26, 2024Updated last year
- Secretsdump C# version only supporting local (live) operation☆55Apr 20, 2025Updated 9 months ago
- ☆33Jan 23, 2025Updated last year
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Sep 29, 2022Updated 3 years ago
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- ☆19Mar 9, 2021Updated 4 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 4 years ago
- Coerce Windows authentication by generating, distributing, and cleaning up poisoned files at scale.☆34Jun 17, 2025Updated 8 months ago
- Sniffing files generator☆61Feb 24, 2025Updated 11 months ago
- ☆415Apr 28, 2021Updated 4 years ago
- ☆160Feb 8, 2025Updated last year