tijldeneut / diana
Diana Credential Recovery Framework
☆56Updated 2 months ago
Alternatives and similar repositories for diana
Users that are interested in diana are comparing it to the libraries listed below
Sorting:
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated last month
- ☆27Updated 2 years ago
- ☆44Updated 10 months ago
- A swiss army knife for pentesting networks☆25Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Hashcat module that can crack a password used to derive an AES-128 key with CryptDeriveKey from CryptoAPI☆32Updated last year
- ☆51Updated last year
- BloodHound PowerShell client☆53Updated last month
- Federated Office365 user enumeration based on correlated response trend analysis☆51Updated 3 years ago
- InfoSec Notes☆56Updated last year
- Living Off the Foreign Land setup scripts☆68Updated 2 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Discord C2 Profile for Mythic☆28Updated 2 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- A PoC for achieving persistence via push notifications on Windows☆46Updated last year
- Source code and examples for PassiveAggression☆56Updated 11 months ago
- ☆38Updated 2 years ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆75Updated 5 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆47Updated last month
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆56Updated 2 years ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 2 years ago
- ☆82Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆91Updated last year
- ☆54Updated 5 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆53Updated 5 months ago
- ☆47Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago