CompassSecurity / conkeyscanLinks
A Pentesters Confluence Keyword Scanner
☆14Updated 11 months ago
Alternatives and similar repositories for conkeyscan
Users that are interested in conkeyscan are comparing it to the libraries listed below
Sorting:
- Nemesis agent for Mythic☆27Updated last year
- ☆38Updated 5 months ago
- Scripts to interact with Microsoft Graph APIs☆43Updated last year
- ☆28Updated 2 years ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆44Updated 8 months ago
- Webshell agent in aspx and php☆26Updated last week
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Updated last year
- P2P Communications of Named Pipes☆12Updated last month
- Automatically deploy Nemesis☆21Updated last year
- fully async implementation of Dirkjan's ROADTools☆32Updated 7 months ago
- Linux CS bypass technique☆32Updated 9 months ago
- ☆44Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆50Updated last year
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆19Updated last month
- A user enumeration tool for Slack.☆31Updated last year
- ☆13Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated last year
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆34Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- Extract registry and NTDS secrets from local or remote disk images☆43Updated 7 months ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Updated 5 years ago
- Your Skyfall Infrastructure Pack☆86Updated 2 weeks ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Updated 3 months ago
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆44Updated 2 months ago
- AWS X-Ray for Covert Command & Control☆36Updated 3 weeks ago
- POC tool to abuse windows server failover clusters☆46Updated 3 months ago
- Discord C2 Profile for Mythic☆33Updated 8 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated 2 years ago