LinkedIn reconnaissance tool
☆54Dec 17, 2021Updated 4 years ago
Alternatives and similar repositories for peasant
Users that are interested in peasant are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆57May 13, 2020Updated 5 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆762Sep 23, 2024Updated last year
- Protocol agnostic online password guessing API.☆85Mar 8, 2023Updated 3 years ago
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆1,083Mar 19, 2024Updated 2 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Dec 17, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- ☆92Dec 8, 2022Updated 3 years ago
- dem sharp donuts☆203Sep 11, 2022Updated 3 years ago
- lateral movement techniques that can be used during red team exercises☆277Jan 13, 2020Updated 6 years ago
- ☆169Dec 8, 2022Updated 3 years ago
- Microsoft External Attack Tool☆178Dec 8, 2022Updated 3 years ago
- Targeted Payload Execution☆100Apr 9, 2020Updated 5 years ago
- Simple parser framework.☆25Jun 21, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Find specific users in active directory via their username and logon IP address☆386Mar 21, 2020Updated 6 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆442Apr 1, 2022Updated 3 years ago
- Create a minidump of the LSASS process from memory☆261Nov 2, 2022Updated 3 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆301Mar 19, 2026Updated last week
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Jun 14, 2021Updated 4 years ago
- A toolkit to attack Office365☆1,118Nov 6, 2020Updated 5 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- This project is just a dumping ground for random scripts I've developed.☆139Aug 14, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- HTA encryption tool for RedTeams☆1,422Nov 9, 2022Updated 3 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 6 years ago
- Search for potential frontable domains☆643Mar 22, 2023Updated 3 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆605Mar 2, 2021Updated 5 years ago
- gather gather gather☆583Mar 15, 2025Updated last year
- ObscurityLabs RedTeam C# Toolkit☆122Sep 3, 2019Updated 6 years ago
- Silencing Sysmon via driver unload☆236Oct 13, 2022Updated 3 years ago
- A tool to create obfuscated HTA script.☆178Jul 2, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and…☆574Jul 3, 2025Updated 8 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆507Sep 23, 2025Updated 6 months ago
- ☆128May 22, 2023Updated 2 years ago
- Chameleon: A tool for evading Proxy categorisation☆512Nov 28, 2024Updated last year
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- How to ARM Yourself - Bsides Tampa 2020☆14Mar 1, 2020Updated 6 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆274Jan 27, 2021Updated 5 years ago