mirror of
https://github.com/enaqx/awesome-pentest.git
synced 2024-12-22 21:59:29 -05:00
Update README.md
This commit is contained in:
parent
95811e5046
commit
ef6693cb33
@ -761,7 +761,7 @@ See also [awesome-reversing](https://github.com/tylerha97/awesome-reversing).
|
|||||||
* [mimikatz](http://blog.gentilkiwi.com/mimikatz) - Credentials extraction tool for Windows operating system.
|
* [mimikatz](http://blog.gentilkiwi.com/mimikatz) - Credentials extraction tool for Windows operating system.
|
||||||
* [redsnarf](https://github.com/nccgroup/redsnarf) - Post-exploitation tool for retrieving password hashes and credentials from Windows workstations, servers, and domain controllers.
|
* [redsnarf](https://github.com/nccgroup/redsnarf) - Post-exploitation tool for retrieving password hashes and credentials from Windows workstations, servers, and domain controllers.
|
||||||
* [wePWNise](https://labs.mwrinfosecurity.com/tools/wepwnise/) - Generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application control and exploit mitigation software.
|
* [wePWNise](https://labs.mwrinfosecurity.com/tools/wepwnise/) - Generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application control and exploit mitigation software.
|
||||||
* [WinPwn](https://github.com/SecureThisShit/WinPwn) - Internal Penetrationtest Script, local and domain reconnaissance, privilege escalation and exploitation
|
* [WinPwn](https://github.com/SecureThisShit/WinPwn) - Internal penetration test script to perform local and domain reconnaissance, privilege escalation and exploitation.
|
||||||
|
|
||||||
## macOS Utilities
|
## macOS Utilities
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user