urbanadventurer / username-anarchyLinks
Username tools for penetration testing
☆1,152Updated 11 months ago
Alternatives and similar repositories for username-anarchy
Users that are interested in username-anarchy are comparing it to the libraries listed below
Sorting:
- Wordlists for creating statistically likely username lists for use in password attacks and security testing☆1,142Updated 2 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,411Updated 3 weeks ago
- ☆251Updated 10 years ago
- WhiteWinterWolf's PHP web shell☆694Updated 7 years ago
- pwning IPv4 via IPv6☆1,829Updated last year
- JAWS - Just Another Windows (Enum) Script☆1,832Updated 4 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,223Updated last year
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆629Updated 3 weeks ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆581Updated 3 years ago
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆908Updated 3 years ago
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010☆1,291Updated last year
- Compiled Binaries for Ghostpack☆1,458Updated 10 months ago
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,224Updated 2 months ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,314Updated 4 months ago
- A Python based ingestor for BloodHound☆2,205Updated last week
- Penelope Shell Handler☆1,027Updated last week
- ☆214Updated 5 years ago
- Simple php reverse shell implemented using binary .☆422Updated last year
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,140Updated 2 years ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,034Updated last year
- PHP shells that work on Linux OS, macOS, and Windows OS.☆501Updated last year
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,621Updated 4 years ago
- CeWL is a Custom Word List Generator☆2,342Updated 10 months ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,182Updated 5 months ago
- ☆1,132Updated 4 years ago
- Hydra Password Cracking Cheetsheet☆406Updated 4 years ago
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆292Updated 3 years ago
- Netcat for windows 32/64 bit☆710Updated last year
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,523Updated 2 years ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆558Updated 2 years ago