PwnAuth
PwnAuth is an open-source tool for generating and managing authentication tokens across multiple protocols, designed for penetration testing and red team exercises.

PwnAuth
PwnAuth is an open-source tool for generating and managing authentication tokens across multiple protocols, designed for penetration testing and red team exercises.
PwnAuth Description
PwnAuth is an open-source authentication token generation and management tool designed for penetration testing and red team operations. The tool provides a framework for creating custom authentication tokens across multiple protocols including Kerberos, NTLM, and LDAP. Users can generate tokens for various authentication mechanisms and modify existing tokens to customize them for specific testing scenarios. The tool features a modular architecture that allows users to extend functionality by adding new token types and protocols as needed. This extensibility makes it suitable for testing different authentication systems and validating security controls. PwnAuth supports token manipulation capabilities, enabling testers to modify token parameters and attributes to simulate various attack scenarios. The tool is designed to help security professionals assess the robustness of authentication mechanisms in their target environments.
PwnAuth FAQ
Common questions about PwnAuth including features, pricing, alternatives, and user reviews.
PwnAuth is PwnAuth is an open-source tool for generating and managing authentication tokens across multiple protocols, designed for penetration testing and red team exercises.. It is a Security Operations solution designed to help security teams with Red Team, NTLM, Open Source.
ALTERNATIVES
InvisibilityCloak is a proof-of-concept C# code obfuscation toolkit designed for red teaming and penetration testing to conceal post-exploitation tools from detection.
Modlishka is a reverse proxy tool for intercepting and manipulating HTTP traffic, ideal for penetration testers, security researchers, and developers to analyze and test web applications.
RedGuard is a C2 front flow control tool that helps evade detection by security systems through traffic filtering and redirection capabilities.
SharpC2 is a C#-based Command and Control framework that provides remote access capabilities for penetration testing and red team operations.
POPULAR
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox