PwnAuth Logo

PwnAuth

0
Free
Visit Website

PwnAuth is an open-source tool for generating and managing authentication tokens, allowing penetration testers and red teams to simulate attacks and test defenses. It provides a flexible framework for creating custom authentication tokens, making it easier to test and validate authentication mechanisms. With PwnAuth, users can generate tokens for various protocols, including Kerberos, NTLM, and LDAP. The tool also supports token manipulation, allowing users to modify and customize tokens to suit their testing needs. PwnAuth is designed to be highly customizable, with a modular architecture that enables users to add new token types and protocols as needed. This makes it an ideal tool for advanced penetration testing and red teaming exercises.

FEATURES

ALTERNATIVES

A cross-platform web fuzzer written in Nim

A cheat sheet providing examples of creating reverse shells for penetration testing.

Pupy is a cross-platform C2 and post-exploitation framework for remote access and control of compromised systems across various operating systems.

A Burp Suite extension for sending large numbers of HTTP requests and analyzing the results.

A powerful enumeration tool for discovering assets and subdomains.

Back-end component for red team operations with crucial design considerations.

A PowerShell toolkit for attacking Azure environments

OWASP OWTF is a penetration testing framework focused on efficiency and alignment with security standards.