Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.
☆14Jan 4, 2026Updated last month
Alternatives and similar repositories for CredSpray
Users that are interested in CredSpray are comparing it to the libraries listed below
Sorting:
- Pentest report framework without data send☆19Sep 23, 2025Updated 5 months ago
- Lightweight, customizable enumeration script to aid in time-saving when participating in hacking labs or OSCP exam.☆28Feb 18, 2026Updated last week
- Config files for my GitHub profile.☆18Apr 8, 2025Updated 10 months ago
- Bash script to parse and convert linpeas\winpeas output files to readable HTML or PDF format☆33Apr 16, 2022Updated 3 years ago
- Learn MongoDB from absolute basics.☆52Jan 16, 2026Updated last month
- Execute commands across Windows and Linux systems using multiple RCE methods☆82Feb 4, 2026Updated 3 weeks ago
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆99Dec 23, 2025Updated 2 months ago
- Disable Kernel DMA Protection on Windows 11 via pre-boot DMA attack☆41Aug 18, 2025Updated 6 months ago
- This is a compiled cheatsheet from my experience of OSCP 2023 journey. Won't say it is all-rounded but a good starting point if you wanna…☆14Oct 17, 2024Updated last year
- 🌀 an Interactive Terminal for AI (interminai) - A PTY proxy enabling AI interaction with interactive CLI applications like vim, git reba…☆40Feb 9, 2026Updated 2 weeks ago
- ☆10Feb 17, 2023Updated 3 years ago
- Code examples from my book and class, PowerShell for Systems Engineers.☆11Jan 6, 2023Updated 3 years ago
- Parses nessus vulnerability scan data to streamline CVE POC lookups☆14Mar 13, 2025Updated 11 months ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 3 months ago
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆37Oct 9, 2025Updated 4 months ago
- Encrypt any C# binary or bin file☆12Aug 1, 2024Updated last year
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Automated Phishing Tool☆11May 27, 2020Updated 5 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆11Mar 25, 2021Updated 4 years ago
- Class☆10Nov 10, 2020Updated 5 years ago
- SlideDecks from Meetups☆12Updated this week
- ADE: automates Active Directory enumeration for labs (Hack The Box, Hack Smarter, TryHackMe, Proving Grounds) and exam prep (OSCP, CPTS).☆28Jan 19, 2026Updated last month
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 5 months ago
- Scan git repos for secrets using regex and entropy 🔑☆10Jun 18, 2020Updated 5 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 7 months ago
- ☆16Jun 15, 2025Updated 8 months ago
- YesMan☆16Nov 8, 2023Updated 2 years ago
- Python3 script to interact with and retrieve data about your FordPass enabled vehicle☆12Apr 4, 2021Updated 4 years ago
- OWASP Certified Secure-Software Developer☆21Jan 21, 2026Updated last month
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Jul 13, 2021Updated 4 years ago
- Wi-Fi Hacking Workshop☆14Dec 27, 2020Updated 5 years ago
- Target files to hack☆15Apr 21, 2020Updated 5 years ago
- Generate a 360 degree view of a user's permissions in Microsoft 365☆18Feb 5, 2026Updated 2 weeks ago
- Red Team Coin for crypto-mining operations.☆23Jan 12, 2026Updated last month
- Generate a fake "systeminfo.exe" binary in order to hide the presence of a VM☆15Jan 4, 2024Updated 2 years ago
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆11Apr 24, 2023Updated 2 years ago
- Files for the Wi-Fi duck workshop☆12Jan 26, 2020Updated 6 years ago
- Spartan is a powerful and versatile network scanning tool designed to help system administrators and security professionals identify vuln…☆17Feb 11, 2025Updated last year
- This repository is a collection of notes, links, tutorials, and experiences aimed at helping others. If you find it useful, please consid…☆19Jun 24, 2025Updated 8 months ago