PwnAuth Logo

PwnAuth

0
Free
Visit Website

PwnAuth is an open-source tool for generating and managing authentication tokens, allowing penetration testers and red teams to simulate attacks and test defenses. It provides a flexible framework for creating custom authentication tokens, making it easier to test and validate authentication mechanisms. With PwnAuth, users can generate tokens for various protocols, including Kerberos, NTLM, and LDAP. The tool also supports token manipulation, allowing users to modify and customize tokens to suit their testing needs. PwnAuth is designed to be highly customizable, with a modular architecture that enables users to add new token types and protocols as needed. This makes it an ideal tool for advanced penetration testing and red teaming exercises.

FEATURES

ALTERNATIVES

Offensive security tool for reconnaissance and information gathering with a wide range of features and future roadmap.

A VM for mobile application security testing, Android and iOS applications, with custom-made tools and scripts.

A subdomain enumeration tool for bug hunting and pentesting

A collection of tips and tricks for container and container orchestration hacking

Generates shellcode that loads Windows payloads from memory and runs them with parameters.

A post-exploitation framework designed to operate covertly on heavily monitored environments.

Emulate operating systems behind SSH servers for testing automation.

A cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved