Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...
☆26Jan 24, 2025Updated last year
Alternatives and similar repositories for generate-ad-username
Users that are interested in generate-ad-username are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ".ashx" Web Shell☆16Aug 18, 2014Updated 11 years ago
- Мой читшит. Можно использовать, но рекомендую сделать свой.☆17Nov 26, 2024Updated last year
- ☆48Oct 15, 2025Updated 5 months ago
- 📧 [Research] E-Mail Injection: Vulnerable applications☆17May 26, 2024Updated last year
- A simple reverse and as well a webshell that recognices the OS (Windows/Linux).☆17Nov 11, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- SIP Tools☆14Sep 15, 2016Updated 9 years ago
- A multithreaded, queued SSH key and/or password spraying tool.☆20Jan 5, 2023Updated 3 years ago
- Solutions to some exercises in the book Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation 1s…☆14Sep 22, 2023Updated 2 years ago
- Pentest Tool to generate usernames/logins based on supplied names.☆37Jan 7, 2019Updated 7 years ago
- 紫菜鱼的网络安全扫描器☆11Dec 19, 2023Updated 2 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆364Feb 12, 2024Updated 2 years ago
- Bruteforces Fortinet SSL VPNs☆58Sep 19, 2023Updated 2 years ago
- Microsoft Developer Blogs Search Tool☆25Apr 24, 2025Updated 11 months ago
- Burp Extension that lets you use Burp Collaborator as a DNS server for exfiltrating data via Sqlmap☆35Oct 7, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Malicious shortcut file builder for spear-phishing and red-team engagement.☆17Sep 11, 2023Updated 2 years ago
- Lexmark CVE-2023-26067☆28Aug 8, 2023Updated 2 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- custom Python script to perform Yara matching in Cortex XDR☆14May 18, 2021Updated 4 years ago
- Collection of username lists for enumerating kerberos domain users☆107Dec 18, 2017Updated 8 years ago
- ☆43Jul 17, 2025Updated 8 months ago
- "VMBreaker" is a specialized tool for virtual machine security testing, offering essential, user-friendly features for efficient penetrat…☆13Apr 15, 2024Updated last year
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆11Jul 6, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Weaponized VSCode Extensions☆15Feb 22, 2026Updated last month
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""☆14Mar 31, 2025Updated 11 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Jul 29, 2024Updated last year
- ☆10Jun 16, 2021Updated 4 years ago
- php webshell bypass D盾、safedog、360、火绒等,仅支持php7☆18Aug 25, 2025Updated 7 months ago
- ☆15Jan 21, 2020Updated 6 years ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Sep 18, 2023Updated 2 years ago
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 5 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆31Jun 14, 2022Updated 3 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆22Jul 2, 2015Updated 10 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆19Mar 11, 2023Updated 3 years ago
- 修改Bug后的ParamSpider,方便各位师傅使用☆13Nov 13, 2024Updated last year
- Fully functioning reverse shell written entirely in VBA.☆126Jun 5, 2023Updated 2 years ago
- Repository with selected IOCs and YARA rules for threat hunting.☆35May 21, 2025Updated 10 months ago
- Simple C++ PoC of SeDebugPrivilege Privesc☆31Feb 12, 2024Updated 2 years ago