ImpostorKeanu / eavesarp-ngLinks
☆42Updated 7 months ago
Alternatives and similar repositories for eavesarp-ng
Users that are interested in eavesarp-ng are comparing it to the libraries listed below
Sorting:
- Find Inbound Email Domains☆35Updated 2 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆45Updated 10 months ago
- Your Skyfall Infrastructure Pack☆89Updated 2 months ago
- Payload Generation Workflow☆40Updated 6 months ago
- Claude MCP server to perform analysis on ROADrecon data☆48Updated 9 months ago
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- ☆52Updated last year
- SMB Audit Tool you were looking for☆23Updated 2 years ago
- ☆65Updated last year
- ☆44Updated last year
- fully async implementation of Dirkjan's ROADTools☆34Updated 10 months ago
- ☆34Updated 5 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated 2 weeks ago
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆57Updated 6 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 10 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆50Updated 11 months ago
- ☆41Updated 11 months ago
- ☆57Updated 7 months ago
- Automatically deploy Nemesis☆21Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- Automated Evilginx phishlet creator Extension for Burpsuite☆61Updated last year
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆32Updated 10 months ago
- POC tool to abuse windows server failover clusters☆53Updated 5 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆54Updated 11 months ago
- Linux CS bypass technique☆32Updated 11 months ago
- Installing wazuh SIEM Unified XDR and SIEM protection☆31Updated 7 months ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆36Updated last week
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Updated 2 years ago