Abusing Kerberos Resource-Based Constrained Delegation This repo is about a practical attack against Kerberos Resource-Based Constrained Delegation in a Windows…
Abusing Kerberos Resource-Based Constrained Delegation This repo is about a practical attack against Kerberos Resource-Based Constrained Delegation in a Windows…
Mihari is a helper to run queries & manage results continuously. Mihari can be used for C2, landing page and…
trivy A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI Trivy (tri pronounced like trigger, vy pronounced like envy) is a…
Tested environments: Windows, MAC, linux, and windows subsystem for linux (WSL) What can SourceWolf do? Crawl through responses to find…
ADE – ActiveDirectoryEnum Enumerate AD through LDAP with a collection of helpful scripts being bundled Included attacks/vectors ASREPRoasting Kerberoasting Dump…
[*] [***] iblessing iblessing is an iOS security exploiting toolkit, it mainly includes application information collection, static analysis and dynamic…
mapcidr Small utility program to perform multiple operations for a given subnet/CIDR ranges. The tool was developed to ease load…
A golang utility to spider through a website searching for additional links with support for JavaScript rendering. Install go get…
SharpHose is a C# password spraying tool designed to be fast, safe, and usable over Cobalt Strike’s execute-assembly. It provides…
Osintgram is a OSINT tool on Instagram. Osintgram offers an interactive shell to perform analysis on Instagram account of any…