strupo / usernames
Username lists that I created.
☆17Updated 3 years ago
Alternatives and similar repositories for usernames:
Users that are interested in usernames are comparing it to the libraries listed below
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆85Updated last year
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆17Updated 5 years ago
- A tool to password spray Jenkins instances☆56Updated 5 years ago
- ☆38Updated 6 years ago
- ☆17Updated 4 years ago
- Library of sites for categorization☆26Updated 6 years ago
- This extension allows a user to specify a lockout policy in order to automate a password spray attack via Intruder.☆25Updated 4 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- Modified version of PEAS client for offensive operations☆38Updated 2 years ago
- Convert ldapdomaindump to Bloodhound☆78Updated last year
- A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet…☆10Updated 2 years ago
- ☆31Updated 4 years ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Updated 5 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Active Directory ACL exploitation with BloodHound☆12Updated 3 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆54Updated 4 years ago
- Takes a URL and checks the system for the tilde enum vuln and then find the files.☆22Updated 5 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆39Updated 3 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆80Updated 3 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆78Updated 3 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆32Updated 6 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆24Updated 2 years ago
- Iterative AD discovery toolkit for offensive operations☆86Updated 4 years ago
- A more obfuscated CactusTorch targeted towards office☆32Updated 4 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago