PwnAuth is an open-source tool for generating and managing authentication tokens, allowing penetration testers and red teams to simulate attacks and test defenses. It provides a flexible framework for creating custom authentication tokens, making it easier to test and validate authentication mechanisms. With PwnAuth, users can generate tokens for various protocols, including Kerberos, NTLM, and LDAP. The tool also supports token manipulation, allowing users to modify and customize tokens to suit their testing needs. PwnAuth is designed to be highly customizable, with a modular architecture that enables users to add new token types and protocols as needed. This makes it an ideal tool for advanced penetration testing and red teaming exercises.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
A powerful tool for extracting passwords and performing various Windows security operations.
Ivy is a payload creation framework for executing arbitrary VBA source code directly in memory, utilizing programmatical access to load, decrypt, and execute shellcode.
Python utility for testing the existence of domain names under different TLDs to find malicious subdomains.
Performs network mapping of attack surfaces and external asset discovery using open source information gathering and active reconnaissance techniques.
A technique for social engineering and untrusted command execution using ClickOnce technology
An open-source penetration testing framework for social engineering with custom attack vectors.