A relatively flexible tool to parse mimikatz output
☆35Oct 11, 2016Updated 9 years ago
Alternatives and similar repositories for parse-mimikatz-log
Users that are interested in parse-mimikatz-log are comparing it to the libraries listed below
Sorting:
- ☆17Jul 26, 2018Updated 7 years ago
- Scan for OSGi Consoles☆21Feb 22, 2024Updated 2 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Ansible playbooks to facilitate redteam stuff☆14Aug 2, 2016Updated 9 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- ☆45Nov 5, 2018Updated 7 years ago
- POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's s…☆105Jul 2, 2017Updated 8 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆19Apr 20, 2016Updated 9 years ago
- AMSI bypass stager generator☆29Feb 5, 2019Updated 7 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- Domain user enumeration tool☆216Nov 2, 2023Updated 2 years ago
- In motherland, target network calls you!☆61Sep 4, 2018Updated 7 years ago
- ☆104Aug 14, 2019Updated 6 years ago
- A ton of helpful tools☆344Oct 8, 2021Updated 4 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- Post module for Metasploit to execute ELF in memory☆86Nov 23, 2018Updated 7 years ago
- A tool to generate a custom code signing certificate chain and generate instructions to sign a binary. Useful for establishing persistenc…☆115Apr 16, 2016Updated 9 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆66Oct 3, 2020Updated 5 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- ☆128May 22, 2023Updated 2 years ago
- Conveigh is a Windows PowerShell LLMNR/NBNS spoofer detection tool☆97Aug 28, 2016Updated 9 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f …☆11Feb 14, 2018Updated 8 years ago
- Burpsuite被动扫描插件☆12Dec 11, 2021Updated 4 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 2 months ago
- A Report Generation Tool for Security Assessment☆65Dec 31, 2018Updated 7 years ago
- Powershell Persistence Locator☆66Sep 11, 2016Updated 9 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆70Jul 26, 2018Updated 7 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Dec 27, 2021Updated 4 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆290Aug 7, 2020Updated 5 years ago
- Samba, NFS shares spider and grepper☆71Jul 11, 2018Updated 7 years ago
- Powershell MS Outlook enumeration and phishing tool☆77May 26, 2016Updated 9 years ago