Basic Auth Phish page
☆25Sep 11, 2017Updated 8 years ago
Alternatives and similar repositories for basicAuth
Users that are interested in basicAuth are comparing it to the libraries listed below
Sorting:
- Script to identify new host using the subjectAltName (Subject Alternate Name) extension of a x509 HTTP TLS certificate.☆12Dec 25, 2020Updated 5 years ago
- A relatively flexible tool to parse mimikatz output☆35Oct 11, 2016Updated 9 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Jun 12, 2020Updated 5 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- intel amt honeypot☆18May 9, 2017Updated 8 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Nov 29, 2016Updated 9 years ago
- Ansible playbooks to facilitate redteam stuff☆14Aug 2, 2016Updated 9 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- ~ BannerGrab☆25Oct 28, 2016Updated 9 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆209Nov 20, 2017Updated 8 years ago
- ☆46Dec 30, 2018Updated 7 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- ☆104Aug 14, 2019Updated 6 years ago
- Decompiled source code of GhostCtrl. It’s not the original source code☆10Jul 26, 2017Updated 8 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- Multithreaded drupalgeddon2 scanner☆12Apr 21, 2018Updated 7 years ago
- ☆23Mar 17, 2024Updated 2 years ago
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Apr 22, 2018Updated 7 years ago
- Domain user enumeration tool☆216Nov 2, 2023Updated 2 years ago
- PowerShell Scripts focused on Post-Exploitation Capabilities☆319Dec 29, 2017Updated 8 years ago
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆19Apr 20, 2016Updated 9 years ago
- Providing timelines based on OSINT Reports☆31Jun 21, 2023Updated 2 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆71Jul 26, 2018Updated 7 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Jun 11, 2016Updated 9 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- A Burp Extender plugin, that will make binary soap objects readable and modifiable.☆29Feb 21, 2022Updated 4 years ago
- Various Cheat Sheets☆183Jun 24, 2021Updated 4 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago