ImpostorKeanu / peasant
LinkedIn reconnaissance tool
☆52Updated 3 years ago
Alternatives and similar repositories for peasant
Users that are interested in peasant are comparing it to the libraries listed below
Sorting:
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆193Updated 10 months ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Updated 10 months ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆67Updated 3 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆162Updated 5 years ago
- Simple parser framework.☆25Updated last year
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆396Updated last year
- DomainCheck is designed to assist operators with monitoring changes related to their domain names. This includes negative changes in cate…☆233Updated 5 months ago
- Bloodhound Attack Path Automation in CobaltStrike☆316Updated 5 years ago
- A framework for stealthy domain reconnaissance☆303Updated 3 years ago
- For all your network pentesting needs☆154Updated 10 months ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- Microsoft External Attack Tool☆179Updated 2 years ago
- Disposable and resilient red team infrastructure with Terraform☆266Updated 6 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆334Updated 6 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Updated 3 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆229Updated 4 years ago
- locate and attack Lync/Skype for Business☆336Updated 7 months ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Updated 4 years ago
- Chameleon: A tool for evading Proxy categorisation☆493Updated 5 months ago
- NebulousAD automated credential auditing tool.☆155Updated 5 years ago
- Lure - User Recon Automation for GoPhish☆163Updated last year
- automated password spraying tool☆148Updated 3 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆217Updated 3 years ago
- ☆282Updated 7 years ago
- ☆384Updated 2 months ago
- Protocol agnostic online password guessing API.☆80Updated 2 years ago
- Domain user enumeration tool☆215Updated last year
- Weaponizing Splunk with reverse and bind shells.☆182Updated 8 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- Passive internal reconnaissance tool☆70Updated 2 years ago