yanncam / multiduplicutLinks
multiduplicut : optimize wordlists-based password cracking methods chaining
☆16Updated 3 years ago
Alternatives and similar repositories for multiduplicut
Users that are interested in multiduplicut are comparing it to the libraries listed below
Sorting:
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- ☆18Updated last year
- Top hashpwn rules☆19Updated 7 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated last year
- Easily-guessable Password Generator for Password Spray Attack☆21Updated 5 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 3 years ago
- Alpine hostapd-mana based RADIUS server☆10Updated 2 years ago
- ☆16Updated 2 months ago
- Kibana app for RedELK☆17Updated 2 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Updated 3 years ago
- ☆14Updated 3 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Updated 3 years ago
- ☆18Updated 4 years ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆22Updated 5 months ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Updated 4 years ago
- A tool to sync mythic events with ghostwriter oplog.☆13Updated 7 months ago
- Database for custom made as well as publicly available stage-2 or beacons or stageless payloads, used by loaders/stage-1/stagers, or for …☆10Updated 5 months ago
- ☆17Updated 6 months ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- ☆11Updated 3 years ago
- Periodically check hashcat cracking progress and notify of success.☆11Updated 6 years ago
- A C# Tool to gather information about email breaches☆14Updated last year
- CVE-2013-4786 Go exploitation tool☆39Updated last year
- ☆12Updated 4 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- ☆11Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆16Updated 3 years ago
- A 'trainer' agent which is great for showing customers a nice fake 'ransom' screen. Requires target machine to have head - since support …☆11Updated last year