Scrape, Hunt, and Transform names and usernames
☆128Nov 19, 2022Updated 3 years ago
Alternatives and similar repositories for BridgeKeeper
Users that are interested in BridgeKeeper are comparing it to the libraries listed below
Sorting:
- Modular Enumeration and Password Spraying Framework☆129Apr 10, 2024Updated last year
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- Username lists that I created.☆17Aug 9, 2021Updated 4 years ago
- A simple email generator that uses dorks on Bing to generate emails from LinkedIn Profiles.☆151Oct 19, 2022Updated 3 years ago
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- Dump stuff without touching disk☆163Oct 29, 2020Updated 5 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping☆1,477Nov 26, 2024Updated last year
- ☆13Nov 24, 2019Updated 6 years ago
- A curated list of awesome BloodhoundAD resources☆237Oct 13, 2022Updated 3 years ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from targe…☆172Mar 12, 2025Updated 11 months ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Aug 11, 2023Updated 2 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆292May 2, 2024Updated last year
- Microsoft External Attack Tool☆178Dec 8, 2022Updated 3 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- A .NET binary loader that bypasses AMSI☆45Sep 20, 2021Updated 4 years ago
- Username enumeration and password spraying tool aimed at Microsoft O365.☆979Nov 6, 2024Updated last year
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆745Jul 29, 2025Updated 7 months ago
- Samba, NFS shares spider and grepper☆71Jul 11, 2018Updated 7 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Dec 4, 2020Updated 5 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆214Nov 26, 2020Updated 5 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- Maximizing BloodHound. Max is a good boy.☆532Apr 25, 2025Updated 10 months ago
- ☆28Dec 28, 2017Updated 8 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- Post-exploitation NTLM password hash extractor☆19Apr 7, 2021Updated 4 years ago
- Enumerate the Domain for Readable and Writable Shares☆23Nov 14, 2025Updated 3 months ago
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 5 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆825Nov 15, 2025Updated 3 months ago
- Fast website scraper and wordlist generator☆82May 6, 2025Updated 10 months ago
- User enumeration with Microsoft Teams API☆175Jul 9, 2021Updated 4 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆38Feb 14, 2026Updated 3 weeks ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆513Aug 6, 2019Updated 6 years ago