Kerbrute - An Script To Perform Kerberos Bruteforcing By Using Impacket Kerbrute - An Script To Perform Kerberos Bruteforcing By Using Impacket Reviewed by Zion3R on 5:30 PM Rating: 5
Chameleon - Customizable Honeypots For Monitoring Network Traffic, Bots Activities And Username\Password Credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres And MySQL) Chameleon - Customizable Honeypots For Monitoring Network Traffic, Bots Activities And Username\Password Credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres And MySQL) Reviewed by Zion3R on 5:30 PM Rating: 5
CornerShot - Amplify Network Visibility From Multiple POV Of Other Hosts CornerShot - Amplify Network Visibility From Multiple POV Of Other Hosts Reviewed by Zion3R on 5:30 PM Rating: 5
Advertisement
SharpSecDump - .Net Port Of The Remote SAM + LSA Secrets Dumping Functionality Of Impacket'S Secretsdump.Py SharpSecDump - .Net Port Of The Remote SAM + LSA Secrets Dumping Functionality Of Impacket'S Secretsdump.Py Reviewed by Zion3R on 5:30 PM Rating: 5
Rbcd-Attack - Kerberos Resource-Based Constrained Delegation Attack From Outside Using Impacket Rbcd-Attack - Kerberos Resource-Based Constrained Delegation Attack From Outside Using Impacket Reviewed by Zion3R on 8:30 AM Rating: 5
Jackdaw - Tool To Collect All Information In Your Domain And Show You Nice Graphs Jackdaw - Tool To Collect All Information In Your Domain And Show You Nice Graphs Reviewed by Zion3R on 8:30 AM Rating: 5
Advertisement
Mssqlproxy - A Toolkit Aimed To Perform Lateral Movement In Restricted Environments Through A Compromised Microsoft SQL Server Via Socket Reuse Mssqlproxy - A Toolkit Aimed To Perform Lateral Movement In Restricted Environments Through A Compromised Microsoft SQL Server Via Socket Reuse Reviewed by Zion3R on 6:00 PM Rating: 5
Lsassy - Extract Credentials From Lsass Remotely Lsassy - Extract Credentials From Lsass Remotely Reviewed by Zion3R on 5:30 PM Rating: 5
RFCpwn - An Enumeration And Exploitation Toolkit Using RFC Calls To SAP RFCpwn - An Enumeration And Exploitation Toolkit Using RFC Calls To SAP Reviewed by Zion3R on 8:00 AM Rating: 5
PrivExchange - Exchange Your Privileges For Domain Admin Privs By Abusing Exchange PrivExchange - Exchange Your Privileges For Domain Admin Privs By Abusing Exchange Reviewed by Zion3R on 7:04 PM Rating: 5
NebulousAD - Automated Credential Auditing Tool NebulousAD - Automated Credential Auditing Tool Reviewed by Zion3R on 9:00 AM Rating: 5
Adidnsdump - Active Directory Integrated DNS Dumping By Any Authenticated User Adidnsdump - Active Directory Integrated DNS Dumping By Any Authenticated User Reviewed by Zion3R on 5:27 PM Rating: 5
ExchangeRelayX - An NTLM Relay Tool To The EWS Endpoint For On-Premise Exchange Servers (Provides An OWA For Hackers) ExchangeRelayX - An NTLM Relay Tool To The EWS Endpoint For On-Premise Exchange Servers (Provides An OWA For Hackers) Reviewed by Zion3R on 9:53 AM Rating: 5
NtlmRelayToEWS - Ntlm Relay Attack To Exchange Web Services NtlmRelayToEWS - Ntlm Relay Attack To Exchange Web Services Reviewed by Zion3R on 10:17 AM Rating: 5
Ridrelay - Quick And Easy Way To Get Domain Usernames While On An Internal Network Ridrelay - Quick And Easy Way To Get Domain Usernames While On An Internal Network Reviewed by Zion3R on 6:31 PM Rating: 5
Impacket - Collection Of Python Classes For Working With Network Protocols Impacket - Collection Of Python Classes For Working With Network Protocols Reviewed by Zion3R on 9:30 AM Rating: 5