strupo / usernames
Username lists that I created.
☆17Updated 3 years ago
Alternatives and similar repositories for usernames:
Users that are interested in usernames are comparing it to the libraries listed below
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆85Updated 2 years ago
- ☆31Updated 4 years ago
- Modified version of PEAS client for offensive operations☆39Updated 2 years ago
- Convert ldapdomaindump to Bloodhound☆79Updated last year
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- This extension allows a user to specify a lockout policy in order to automate a password spray attack via Intruder.☆25Updated 4 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆17Updated 5 years ago
- ☆39Updated 6 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- A tool to password spray Jenkins instances☆56Updated 5 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆54Updated 4 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆50Updated 2 years ago
- ☆17Updated 4 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Iterative AD discovery toolkit for offensive operations☆86Updated 5 years ago
- BH Cypher Queries picked up from random places☆38Updated 6 years ago
- .NET wrapper around LogonUserA to test creds☆11Updated 2 years ago
- Library of sites for categorization☆26Updated 6 years ago
- A PowerShell script for performing a build review of a Windows host☆23Updated 6 years ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆34Updated last year
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- Tooling I utilized within the PEN300 training labs☆4Updated 2 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆84Updated 2 years ago