PwnAuth Logo

PwnAuth

PwnAuth is an open-source tool for generating and managing authentication tokens across multiple protocols, designed for penetration testing and red team exercises.

395
Visit website
Claim and verify your listing
0

PwnAuth Description

PwnAuth is an open-source authentication token generation and management tool designed for penetration testing and red team operations. The tool provides a framework for creating custom authentication tokens across multiple protocols including Kerberos, NTLM, and LDAP. Users can generate tokens for various authentication mechanisms and modify existing tokens to customize them for specific testing scenarios. The tool features a modular architecture that allows users to extend functionality by adding new token types and protocols as needed. This extensibility makes it suitable for testing different authentication systems and validating security controls. PwnAuth supports token manipulation capabilities, enabling testers to modify token parameters and attributes to simulate various attack scenarios. The tool is designed to help security professionals assess the robustness of authentication mechanisms in their target environments.

PwnAuth FAQ

Common questions about PwnAuth including features, pricing, alternatives, and user reviews.

PwnAuth is PwnAuth is an open-source tool for generating and managing authentication tokens across multiple protocols, designed for penetration testing and red team exercises.. It is a Security Operations solution designed to help security teams with Red Team, NTLM, Offensive Security.

Have more questions? Browse our categories or search for specific tools.

FEATURED

Heeler Application Security Auto-Remediation Logo

Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
OSINTLeak Real-time OSINT Leak Intelligence Logo

Real-time OSINT monitoring for leaked credentials, data, and infrastructure

8
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

6
TestSavant AI Security Assurance Platform Logo

AI security assurance platform for red-teaming, guardrails & compliance

5
Guide to Ethical Hacking Logo

A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.

5
View Popular Tools →

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox