H3LL0WORLD / Gmail-EnumView external linksLinks
Gmail Enumeration using a glitch described here https://blog.0day.rocks/abusing-gmail-to-get-previously-unlisted-e-mail-addresses-41544b62b2
☆28Aug 4, 2022Updated 3 years ago
Alternatives and similar repositories for Gmail-Enum
Users that are interested in Gmail-Enum are comparing it to the libraries listed below
Sorting:
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 4 years ago
- A set of scripts to help automate the management of Burp Collaborator☆12Sep 5, 2025Updated 5 months ago
- Random code snippets☆11Oct 27, 2023Updated 2 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 6 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Jul 2, 2021Updated 4 years ago
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆48Jul 19, 2022Updated 3 years ago
- Get Fine Grained Password Policy☆77Apr 15, 2025Updated 9 months ago
- ☆22Mar 16, 2021Updated 4 years ago
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 6 years ago
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆22Oct 25, 2021Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆22Aug 20, 2019Updated 6 years ago
- Takes the original idea of NetCease and adds functionality☆24Feb 6, 2022Updated 4 years ago
- Gophish companion script for sms phishing.☆19Dec 10, 2019Updated 6 years ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆38Dec 5, 2025Updated 2 months ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- ☆18Apr 21, 2020Updated 5 years ago
- Learning Various Process Injection Techniques☆17Apr 4, 2019Updated 6 years ago
- Mythic Scripting PyPi package - mythic☆28Oct 10, 2025Updated 4 months ago
- ☆25Jul 7, 2022Updated 3 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- Persistent through COM Hijacking☆22Jan 15, 2019Updated 7 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆22May 29, 2018Updated 7 years ago
- Curated list of well-developed C# Offensive Tools☆20Jan 30, 2020Updated 6 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Dec 17, 2023Updated 2 years ago
- Variety of different process injections implemented in C++☆26May 2, 2021Updated 4 years ago
- Decrypt NTDS hashes☆23Jan 22, 2014Updated 12 years ago
- Gmail Knocker☆23Jul 24, 2017Updated 8 years ago
- results of scraping OneDrive from February 2022 - March 2025☆26Apr 29, 2025Updated 9 months ago
- A tool for bypass certify pinning in Android apps☆25Apr 11, 2020Updated 5 years ago
- ☆26Jul 12, 2023Updated 2 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆114Feb 21, 2023Updated 2 years ago
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆44Jul 9, 2025Updated 7 months ago