w0Tx / generate-ad-usernameView external linksLinks
Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...
☆26Jan 24, 2025Updated last year
Alternatives and similar repositories for generate-ad-username
Users that are interested in generate-ad-username are comparing it to the libraries listed below
Sorting:
- Мой читшит. Можно использовать, но рекомендую сделать свой.☆17Nov 26, 2024Updated last year
- ".ashx" Web Shell☆15Aug 18, 2014Updated 11 years ago
- A multithreaded, queued SSH key and/or password spraying tool.☆20Jan 5, 2023Updated 3 years ago
- 📧 [Research] E-Mail Injection: Vulnerable applications☆18May 26, 2024Updated last year
- ☆48Oct 15, 2025Updated 4 months ago
- A simple reverse and as well a webshell that recognices the OS (Windows/Linux).☆16Nov 11, 2020Updated 5 years ago
- Malicious shortcut file builder for spear-phishing and red-team engagement.☆17Sep 11, 2023Updated 2 years ago
- ☆18Dec 12, 2020Updated 5 years ago
- Burp Extension that lets you use Burp Collaborator as a DNS server for exfiltrating data via Sqlmap☆36Oct 7, 2021Updated 4 years ago
- Microsoft Developer Blogs Search Tool☆25Apr 24, 2025Updated 9 months ago
- Pentest Tool to generate usernames/logins based on supplied names.☆37Jan 7, 2019Updated 7 years ago
- Bruteforces Fortinet SSL VPNs☆57Sep 19, 2023Updated 2 years ago
- ☆43Jul 17, 2025Updated 6 months ago
- ☆30Sep 20, 2023Updated 2 years ago
- Resources for AD penetration testing and security☆33Feb 21, 2022Updated 3 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆353Feb 12, 2024Updated 2 years ago
- ☆43Dec 28, 2023Updated 2 years ago
- Automatic multiprocess Linux CLI tool that aims for a quick enumeration wrapping pentesting tools.☆13Feb 1, 2026Updated 2 weeks ago
- ☆10Jan 26, 2026Updated 3 weeks ago
- A post-exploitation tool to decrypt SolarPutty's sessions files☆37Dec 8, 2022Updated 3 years ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆153Oct 12, 2023Updated 2 years ago
- Active Directory Penetration Testing Tool☆38Jun 2, 2024Updated last year
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆89Feb 16, 2022Updated 4 years ago
- My (newer) Emacs configuration☆14Sep 14, 2025Updated 5 months ago
- Calculate the domain age with python script☆11Mar 27, 2018Updated 7 years ago
- A Midi-to-SVG/PDF converter for various music boxes.☆11Feb 1, 2026Updated 2 weeks ago
- Exploit codes for rconfig <= 3.9.4☆12Mar 17, 2020Updated 5 years ago
- A command-line tool for interacting with HackMyVM, supporting machine listing, downloading, and flag submission with session persistence.☆17Jan 18, 2026Updated 3 weeks ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Jan 26, 2021Updated 5 years ago
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆40Aug 15, 2024Updated last year
- Powershell scripts for exfiltration.☆12Oct 5, 2024Updated last year
- Git All the Payloads! A collection of web attack payloads.☆10Dec 31, 2018Updated 7 years ago
- "VMBreaker" is a specialized tool for virtual machine security testing, offering essential, user-friendly features for efficient penetrat…☆13Apr 15, 2024Updated last year
- uitvim :P (IDE)☆29Updated this week
- ☆13Feb 25, 2023Updated 2 years ago
- Scalable URL obfuscator service☆11Feb 14, 2023Updated 3 years ago
- A 1014 Byte ELF64/DOS.COM/GameBoy/Megadrive/PDF/ARJ/PKZIP/7zip Polyglot Binary☆13Sep 8, 2022Updated 3 years ago
- Awesome Data Sanitization☆12Jun 6, 2021Updated 4 years ago