strupo / usernames
Username lists that I created.
☆17Updated 3 years ago
Alternatives and similar repositories for usernames:
Users that are interested in usernames are comparing it to the libraries listed below
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆87Updated 2 years ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Updated 5 years ago
- Library of sites for categorization☆26Updated 6 years ago
- ☆39Updated 6 years ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Updated 6 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆54Updated 4 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- ☆17Updated 4 years ago
- A tool to password spray Jenkins instances☆56Updated 5 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 2 years ago
- Iterative AD discovery toolkit for offensive operations☆87Updated 5 years ago
- Stuff for OSWP Exam - Try harder ^^☆9Updated 7 years ago
- ☆16Updated 7 years ago
- ☆32Updated 5 years ago
- Go client for Elasticsearch OSINT platform☆15Updated last year
- Federated Office365 user enumeration based on correlated response trend analysis☆51Updated 3 years ago
- A PowerShell script for performing a build review of a Windows host☆23Updated 6 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆85Updated 2 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆41Updated 4 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 3 years ago
- ☆9Updated 3 years ago
- Fly into Gophish with One Click (Infra Automation)☆48Updated 2 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- BH Cypher Queries picked up from random places☆38Updated 6 years ago