w0Tx / generate-ad-usernameView external linksLinks
Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...
☆26Jan 24, 2025Updated last year
Alternatives and similar repositories for generate-ad-username
Users that are interested in generate-ad-username are comparing it to the libraries listed below
Sorting:
- Мой читшит. Можно использовать, но рекомендую сделать свой.☆17Nov 26, 2024Updated last year
- A multithreaded, queued SSH key and/or password spraying tool.☆20Jan 5, 2023Updated 3 years ago
- 📧 [Research] E-Mail Injection: Vulnerable applications☆18May 26, 2024Updated last year
- ☆48Oct 15, 2025Updated 4 months ago
- Malicious shortcut file builder for spear-phishing and red-team engagement.☆17Sep 11, 2023Updated 2 years ago
- Burp Extension that lets you use Burp Collaborator as a DNS server for exfiltrating data via Sqlmap☆36Oct 7, 2021Updated 4 years ago
- Microsoft Developer Blogs Search Tool☆25Apr 24, 2025Updated 9 months ago
- Simple C++ PoC of SeDebugPrivilege Privesc☆29Feb 12, 2024Updated 2 years ago
- Bruteforces Fortinet SSL VPNs☆57Sep 19, 2023Updated 2 years ago
- ☆43Jul 17, 2025Updated 6 months ago
- ☆30Sep 20, 2023Updated 2 years ago
- Community documentation for known Hack The Box v4 API endpoints☆26Oct 6, 2022Updated 3 years ago
- Convert ldapdomaindump to Bloodhound☆80Dec 19, 2023Updated 2 years ago
- Fully functioning reverse shell written entirely in VBA.☆126Jun 5, 2023Updated 2 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆353Feb 12, 2024Updated 2 years ago
- ☆10Jun 16, 2021Updated 4 years ago
- 紫菜鱼的网络安全扫描器☆11Dec 19, 2023Updated 2 years ago
- ☆10Jan 26, 2026Updated 3 weeks ago
- Automatic multiprocess Linux CLI tool that aims for a quick enumeration wrapping pentesting tools.☆13Feb 1, 2026Updated 2 weeks ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆153Oct 12, 2023Updated 2 years ago
- A post-exploitation tool to decrypt SolarPutty's sessions files☆37Dec 8, 2022Updated 3 years ago
- Active Directory Penetration Testing Tool☆38Jun 2, 2024Updated last year
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆89Feb 16, 2022Updated 4 years ago
- My (newer) Emacs configuration☆14Sep 14, 2025Updated 5 months ago
- Exploit codes for rconfig <= 3.9.4☆12Mar 17, 2020Updated 5 years ago
- Scan for potentially vulnerable drivers☆94Mar 5, 2022Updated 3 years ago
- A command-line tool for interacting with HackMyVM, supporting machine listing, downloading, and flag submission with session persistence.☆17Jan 18, 2026Updated 3 weeks ago
- Command generator for pentesting tools☆16Dec 2, 2024Updated last year
- Calculate the domain age with python script☆11Mar 27, 2018Updated 7 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Jan 26, 2021Updated 5 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆40Aug 15, 2024Updated last year
- Protection against HTML smuggling attacks.☆101Jul 10, 2025Updated 7 months ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆18Mar 20, 2025Updated 10 months ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- Follina (CVE-2022-30190) is a Microsoft Office zero-day vulnerability that has recently been discovered. It’s a high-severity vulnerabili…☆10May 14, 2023Updated 2 years ago
- A python RCE exploit on QNAP-QTS☆14Sep 15, 2020Updated 5 years ago
- Inject scripts into gzipped pages without decompression☆14Feb 4, 2026Updated last week
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago