tarraschk / richelieuView external linksLinks
List of the most common French passwords
☆374Feb 13, 2024Updated 2 years ago
Alternatives and similar repositories for richelieu
Users that are interested in richelieu are comparing it to the libraries listed below
Sorting:
- Outil de récupération automatique des données de l'Active Directory / Automated tool for dumping Active Directory data☆274Jan 6, 2026Updated last month
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- Tool to extract Kerberos tickets from Linux kernel keys.☆237May 28, 2019Updated 6 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- ☆44Apr 20, 2020Updated 5 years ago
- The Alternative Fileless File System☆57Apr 4, 2019Updated 6 years ago
- Change up a binary's embedded resources with this little creature.☆36Mar 24, 2020Updated 5 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Jul 17, 2018Updated 7 years ago
- Quickly Implement Mod-Rewrite in your infastructure☆86Apr 21, 2017Updated 8 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- Man in the middle for NLA enabled RDP in python☆15Nov 26, 2021Updated 4 years ago
- Certificate Export Utility☆26May 1, 2020Updated 5 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 7 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- Configuration security audit framework☆21Apr 27, 2016Updated 9 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Burp Extension for AWS Signing☆90Jan 10, 2025Updated last year
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- Generate graphs and charts based on password cracking result☆163Feb 17, 2023Updated 2 years ago
- Dumping DPAPI credz remotely☆1,318Mar 24, 2025Updated 10 months ago
- ☆25Nov 2, 2021Updated 4 years ago
- Fully featured and community-driven hacking environment☆2,916Jan 14, 2026Updated last month
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Nov 30, 2017Updated 8 years ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,680Nov 29, 2024Updated last year
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆322Jun 5, 2017Updated 8 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆400Nov 12, 2019Updated 6 years ago
- A simple embedded Linux backdoor.☆199Oct 25, 2020Updated 5 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated last month
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆190Dec 19, 2023Updated 2 years ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- Extract credentials from lsass remotely☆2,176Dec 24, 2025Updated last month
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Forensics artefact collection tool for systems running Microsoft Windows☆431Mar 26, 2025Updated 10 months ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆634Jun 20, 2017Updated 8 years ago
- Plaintext Password harvesting from Azure Windows VMs☆68Mar 19, 2018Updated 7 years ago
- Reverse shell container for k8s deployments☆49Feb 21, 2020Updated 5 years ago