LogoHackDB
  • Recent
  • Search
  • Pricing
  • Submit
LogoHackDB

Tag

Internal

Tools and methodologies for internal network penetration testing, Active Directory exploitation, lateral movement, and privilege escalation.

Back to tags
image of pretender
Infrastructure Security
Visit Website

pretender

Details

A MitM tool for relaying attacks, featuring DHCPv6 DNS takeover and local name resolution spoofing (mDNS, LLMNR, NetBIOS-NS).

Internal
image of pypykatz
Red Team OperationsInfrastructure Security
Visit Website

pypykatz

Details

pypykatz is a pure Python Mimikatz implementation for extracting credentials and secrets from Windows systems and memory dumps.

InternalExternal
image of winPEAS
Infrastructure Security
Visit Website

winPEAS

Details

PEASS-ng/winPEAS is a suite of scripts designed to identify potential privilege escalation paths on Windows systems.

Internal
image of yetAnotherObfuscator
Exploit Development
Visit Website

yetAnotherObfuscator

Details

C# obfuscator designed to bypass Windows Defender, offering a practical solution for protecting .NET applications.

Internal
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • Next
LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Resources
  • Search
  • Category
  • Tag
Listing
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2026 All Rights Reserved.