PwnAuth Logo

PwnAuth

0
Free
Visit Website

PwnAuth is an open-source tool for generating and managing authentication tokens, allowing penetration testers and red teams to simulate attacks and test defenses. It provides a flexible framework for creating custom authentication tokens, making it easier to test and validate authentication mechanisms. With PwnAuth, users can generate tokens for various protocols, including Kerberos, NTLM, and LDAP. The tool also supports token manipulation, allowing users to modify and customize tokens to suit their testing needs. PwnAuth is designed to be highly customizable, with a modular architecture that enables users to add new token types and protocols as needed. This makes it an ideal tool for advanced penetration testing and red teaming exercises.

FEATURES

ALTERNATIVES

Insights on Red Teaming for Pacific Rim CCDC 2016 competition, focusing on preparation, operations plan, and automation.

A front-end JavaScript toolkit for creating DNS rebinding attacks

Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.

A cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments

A tool for testing Cross Site Scripting vulnerabilities

Performs network mapping of attack surfaces and external asset discovery using open source information gathering and active reconnaissance techniques.

Using Apache mod_rewrite rules to rewrite incident responder or security appliance requests to an innocuous website or the target's real website.

A scripting engine for interacting with GraphQL endpoints for pentesting purposes.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved