Name Attribute Description
ADCSKiller-d74bfea91f24a09df74262998d60f213609b45c6 nur.repos.exploitoverload.ADCSKiller ADCSKiller is a Python-based tool designed to automate the process of discovering and exploiting Active Directory Certificate Services (ADCS) vulnerabilities. It leverages features of Certipy and Coercer to simplify the process of attacking ADCS infrastructure.
BloodHound-4.3.1 nur.repos.exploitoverload.BloodHound BloodHound is a single page Javascript web application, built on top of Linkurious, compiled with Electron, with a Neo4j database fed by a C# data collector.
Responder- nur.repos.exploitoverload.Responder Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication
bloodhound-python-1.0.1 nur.repos.exploitoverload.bloodhound-python BloodHound.py is a Python based ingestor for BloodHound, based on Impacket.
maltego-4.4.1 nur.repos.exploitoverload.maltego An open source intelligence and forensics application, enabling to easily gather information about DNS, domains, IP addresses, websites, persons, etc.
polenum-1.6.1 nur.repos.exploitoverload.polenum Uses Core’s Impacket Library to get the password policy from a windows machine
psudohash-2d586dec8b5836546ae54b924eb59952a7ee393c nur.repos.exploitoverload.psudohash Psudohash is a password list generator for orchestrating brute force attacks and cracking hashes.
seclists-2023.2 nur.repos.exploitoverload.seclists SecLists is the security tester’s companion. It’s a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.