Red Team
AD Authentication. Kerberos Attacks with ACL abuse capabilities. This CLI tool supports an attackers to perfrom a Kerberos Attacks and NTLM Relay Attacks
Enhance swiss army knife, for penetration testing networks. Kerberos attacks and passwords spraying. Additionally, a database is used to store used & dumped credentals for Administrator and user Atβ¦
Apple iD & Credentials BruteForcer. iCloud Apple ID Dictionary Attack that Bypasses Account Lockout restrictions and Secondary Authentication.
Automatic Injection attacks. Blind SQL, NoSQL, SQL, Blind GQL, GQL, Command, LDAP, Traversal, JNDI, JDBC, Esi, El, Etc. Clear mapping.
CarpaAlko is a notorious Smartphones Malware family, known for its Remote Administration & Access Tools, which include remote Device control and advanced Spyware functions like keylogging, gesture β¦
Teeth - smilodon cybertooth is a password decryption utilities for online services & offline hashes, fastest and most advanced password cracking. Supports hundreds of hash & cipher types, runs on mβ¦
Release Neo, the Evil Ducky scripts into any Hardware or drive and watch that Devices burn.
TheFatRat : Remote control Access Devices and exploiting tool, used as a deadly Backdoor generator that bypass most anti virus software. Penetrate a strong system such as Windows, MacOS, Android, aβ¦
Perform a ( hard-core ) force attack to get the correct credentials in under one minute, with the help of π§π²π²ππ΅ cybertooth && ππΌπ΅π» the Ripper. Fastest and most advanced password and logon cracking.β¦
Combining 'authentication' and 'grilling' to convey. Active directory ( trust attack ). performing an advance Kerberos attack may result in user accounts being suspended. Therefore, the attackers sβ¦
A repository of sysmon configuration modules