Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...
☆26Jan 24, 2025Updated last year
Alternatives and similar repositories for generate-ad-username
Users that are interested in generate-ad-username are comparing it to the libraries listed below
Sorting:
- Мой читшит. Можно использовать, но рекомендую сделать свой.☆17Nov 26, 2024Updated last year
- 📧 [Research] E-Mail Injection: Vulnerable applications☆17May 26, 2024Updated last year
- A multithreaded, queued SSH key and/or password spraying tool.☆20Jan 5, 2023Updated 3 years ago
- A simple reverse and as well a webshell that recognices the OS (Windows/Linux).☆16Nov 11, 2020Updated 5 years ago
- Malicious shortcut file builder for spear-phishing and red-team engagement.☆17Sep 11, 2023Updated 2 years ago
- ☆18Dec 12, 2020Updated 5 years ago
- Microsoft Developer Blogs Search Tool☆25Apr 24, 2025Updated 10 months ago
- Collection of username lists for enumerating kerberos domain users☆107Dec 18, 2017Updated 8 years ago
- ☆30Sep 20, 2023Updated 2 years ago
- ☆43Jul 17, 2025Updated 7 months ago
- Community documentation for known Hack The Box v4 API endpoints☆26Oct 6, 2022Updated 3 years ago
- Convert ldapdomaindump to Bloodhound☆80Dec 19, 2023Updated 2 years ago
- Fully functioning reverse shell written entirely in VBA.☆126Jun 5, 2023Updated 2 years ago
- Resources for AD penetration testing and security☆33Feb 21, 2022Updated 4 years ago
- 紫菜鱼的网络安全扫描器☆11Dec 19, 2023Updated 2 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆362Feb 12, 2024Updated 2 years ago
- Automatic multiprocess Linux CLI tool that aims for a quick enumeration wrapping pentesting tools.☆13Feb 22, 2026Updated 2 weeks ago
- ☆10Jun 16, 2021Updated 4 years ago
- A post-exploitation tool to decrypt SolarPutty's sessions files☆37Dec 8, 2022Updated 3 years ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆153Oct 12, 2023Updated 2 years ago
- Active Directory Penetration Testing Tool☆38Jun 2, 2024Updated last year
- Generate letters (plain text or PDF) from templates.☆14Jan 8, 2023Updated 3 years ago
- My (newer) Emacs configuration☆14Sep 14, 2025Updated 5 months ago
- Calculate the domain age with python script☆11Mar 27, 2018Updated 7 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Jan 26, 2021Updated 5 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆41Aug 15, 2024Updated last year
- Protection against HTML smuggling attacks.☆101Jul 10, 2025Updated 7 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆50Feb 29, 2024Updated 2 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆18Mar 20, 2025Updated 11 months ago
- ☆11Dec 8, 2023Updated 2 years ago
- TakedownGPT combines a LangChain Agent with OpenAI function calling to automate the discovery of domain registrars and drafting of takedo…☆50Jan 31, 2026Updated last month
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- ☆10Aug 9, 2024Updated last year
- Powershell scripts for exfiltration.☆12Oct 5, 2024Updated last year
- Script to crawl crbugs (Chromium Issues).☆10Jul 15, 2021Updated 4 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- 3D (Stereoscopic) Camera streamer using two Raspberry Pi Zeros and two Pi Cameras in a ProtoStax Enclosure☆10Jan 9, 2025Updated last year