DanusMinimus / snallybuckster
Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!
☆27Updated 3 years ago
Alternatives and similar repositories for snallybuckster:
Users that are interested in snallybuckster are comparing it to the libraries listed below
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 4 months ago
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆101Updated 9 months ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Password Spraying Framework☆63Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- ☆32Updated 5 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- blame Huy☆42Updated 4 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- Zoom Persistence Aggressor and Handler☆55Updated 4 years ago
- Exchangelib wrapper for pentesting☆64Updated 2 months ago
- A tool to password spray Jenkins instances☆56Updated 5 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆87Updated 2 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 2 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆66Updated 10 months ago
- ☆55Updated last year
- Discord C2 Profile for Mythic☆28Updated 2 months ago
- C# tool to discover low hanging fruits☆93Updated 2 years ago
- Convert ldapdomaindump to Bloodhound☆79Updated last year
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆51Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year