Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...
☆26Jan 24, 2025Updated last year
Alternatives and similar repositories for generate-ad-username
Users that are interested in generate-ad-username are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ".ashx" Web Shell☆16Aug 18, 2014Updated 11 years ago
- Мой читшит. Можно использовать, но рекомендую сделать свой.☆18Nov 26, 2024Updated last year
- 📧 [Research] E-Mail Injection: Vulnerable applications☆17May 26, 2024Updated last year
- ☆18Dec 12, 2020Updated 5 years ago
- ☆91May 1, 2026Updated last week
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A multithreaded, queued SSH key and/or password spraying tool.☆20Jan 5, 2023Updated 3 years ago
- Solutions to some exercises in the book Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation 1s…☆14Sep 22, 2023Updated 2 years ago
- ☆30Sep 20, 2023Updated 2 years ago
- My course work about basic binary exploitation.🤿☆12Mar 16, 2022Updated 4 years ago
- Pentest Tool to generate usernames/logins based on supplied names.☆38Jan 7, 2019Updated 7 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆24Jul 31, 2025Updated 9 months ago
- 紫菜鱼的网络安全扫描器☆11Dec 19, 2023Updated 2 years ago
- Access remote Windows devices for common IT admin tasks and information☆12Sep 24, 2025Updated 7 months ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆369Feb 12, 2024Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Bruteforces Fortinet SSL VPNs☆58Sep 19, 2023Updated 2 years ago
- 参照xffhelper源码修改,结合了fakeip的功能,生成jar包,不再需要py支持☆14Jun 10, 2021Updated 4 years ago
- PoC for CVE-2022-23940☆12May 7, 2025Updated last year
- Microsoft Developer Blogs Search Tool☆25Apr 24, 2025Updated last year
- Lexmark CVE-2023-26067☆28Aug 8, 2023Updated 2 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- custom Python script to perform Yara matching in Cortex XDR☆14May 18, 2021Updated 4 years ago
- Collection of username lists for enumerating kerberos domain users☆107Dec 18, 2017Updated 8 years ago
- CVE-2023-46818 Python3 Exploit for ISPConfig <= 3.2.11 (language_edit.php) PHP Code Injection Vulnerability☆15Apr 16, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆44Jul 17, 2025Updated 9 months ago
- "VMBreaker" is a specialized tool for virtual machine security testing, offering essential, user-friendly features for efficient penetrat…☆14Apr 15, 2024Updated 2 years ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- Patch a Windows PE (.exe, .dll, etc..) so it no longer loads with a random dynamic base. Saves changing breakpoint addresses between debu…☆15Apr 5, 2020Updated 6 years ago
- 目前通过自学已经取得 OSCP(Offensive Security Certified Professional)证书,本项目用于记录、分享、交流。☆11Aug 16, 2022Updated 3 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆11Jul 6, 2022Updated 3 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Helpful commands for starting and working in your vault with the PARA method.☆11Apr 18, 2024Updated 2 years ago
- REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""☆14Mar 31, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Jul 29, 2024Updated last year
- ☆10Jun 16, 2021Updated 4 years ago
- Weaponized VSCode Extensions☆17Updated this week
- Generate letters (plain text or PDF) from templates.☆14Jan 8, 2023Updated 3 years ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Sep 18, 2023Updated 2 years ago
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 7 months ago
- Windows GPU rootkit PoC by Team Jellyfish☆22Jul 2, 2015Updated 10 years ago