PwnAuth Logo

PwnAuth

0
Free
Visit Website

PwnAuth is an open-source tool for generating and managing authentication tokens, allowing penetration testers and red teams to simulate attacks and test defenses. It provides a flexible framework for creating custom authentication tokens, making it easier to test and validate authentication mechanisms. With PwnAuth, users can generate tokens for various protocols, including Kerberos, NTLM, and LDAP. The tool also supports token manipulation, allowing users to modify and customize tokens to suit their testing needs. PwnAuth is designed to be highly customizable, with a modular architecture that enables users to add new token types and protocols as needed. This makes it an ideal tool for advanced penetration testing and red teaming exercises.

FEATURES

ALTERNATIVES

A tool for Local File Inclusion (LFI) exploitation and scanning

A post-exploitation tool for pentesting Active Directory

Emulate offensive attack techniques in the cloud with a self-contained Go binary.

A tool for enumerating and attacking GitHub Actions pipelines

Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang for efficient and secure communication.

Chameleon aids in evading proxy categorization to bypass internet filters.

A toolkit to attack Office365, including tools for password spraying, password cracking, token manipulation, and exploiting vulnerabilities in Office365 APIs and services.

A distributed systems and infrastructure simulator for attacking and debugging Kubernetes.