urbanadventurer / username-anarchyLinks
Username tools for penetration testing
☆1,123Updated 10 months ago
Alternatives and similar repositories for username-anarchy
Users that are interested in username-anarchy are comparing it to the libraries listed below
Sorting:
- Wordlists for creating statistically likely username lists for use in password attacks and security testing☆1,133Updated 2 years ago
- WhiteWinterWolf's PHP web shell☆691Updated 7 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,393Updated this week
- ☆240Updated 10 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆568Updated 3 years ago
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆904Updated 3 years ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆629Updated 3 years ago
- pwning IPv4 via IPv6☆1,822Updated last year
- JAWS - Just Another Windows (Enum) Script☆1,821Updated 4 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,197Updated last year
- Compiled Binaries for Ghostpack☆1,441Updated 9 months ago
- A Python based ingestor for BloodHound☆2,200Updated 4 months ago
- PHP shells that work on Linux OS, macOS, and Windows OS.☆503Updated last year
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010☆1,286Updated last year
- A tool to perform Kerberos pre-auth bruteforcing☆2,999Updated 11 months ago
- ☆212Updated 5 years ago
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,138Updated 2 years ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,308Updated 3 months ago
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,225Updated last month
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,616Updated 4 years ago
- Simple php reverse shell implemented using binary .☆419Updated last year
- Collection of reverse shells for red team operations.☆508Updated 4 months ago
- Penelope Shell Handler☆1,004Updated 2 weeks ago
- Hydra Password Cracking Cheetsheet☆404Updated 4 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,520Updated 2 years ago
- Automatic Enumeration Tool based in Open Source tools☆928Updated last year
- ☆1,129Updated 4 years ago
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆291Updated 3 years ago
- CeWL is a Custom Word List Generator☆2,307Updated 9 months ago
- Windows Local Privilege Escalation from Service Account to System☆841Updated 5 years ago