ImpostorKeanu / peasantView external linksLinks
LinkedIn reconnaissance tool
☆55Dec 17, 2021Updated 4 years ago
Alternatives and similar repositories for peasant
Users that are interested in peasant are comparing it to the libraries listed below
Sorting:
- ☆57May 13, 2020Updated 5 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆760Sep 23, 2024Updated last year
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- lateral movement techniques that can be used during red team exercises☆273Jan 13, 2020Updated 6 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Dec 17, 2021Updated 4 years ago
- ☆169Dec 8, 2022Updated 3 years ago
- ☆92Dec 8, 2022Updated 3 years ago
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆1,072Mar 19, 2024Updated last year
- Microsoft External Attack Tool☆178Dec 8, 2022Updated 3 years ago
- Targeted Payload Execution☆100Apr 9, 2020Updated 5 years ago
- dem sharp donuts☆202Sep 11, 2022Updated 3 years ago
- Protocol agnostic online password guessing API.☆85Mar 8, 2023Updated 2 years ago
- This project is just a dumping ground for random scripts I've developed.☆139Aug 14, 2024Updated last year
- A toolkit to attack Office365☆1,114Nov 6, 2020Updated 5 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆504Sep 23, 2025Updated 4 months ago
- gather gather gather☆584Mar 15, 2025Updated 10 months ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 5 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Jun 14, 2021Updated 4 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆441Apr 1, 2022Updated 3 years ago
- A tool to create obfuscated HTA script.☆178Jul 2, 2021Updated 4 years ago
- Sustainable shellcode evasion☆112Dec 11, 2024Updated last year
- Silencing Sysmon via driver unload☆235Oct 13, 2022Updated 3 years ago
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- ☆69Dec 19, 2018Updated 7 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆602Mar 2, 2021Updated 4 years ago
- Create a minidump of the LSASS process from memory☆261Nov 2, 2022Updated 3 years ago
- ☆128May 22, 2023Updated 2 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆781Jun 20, 2020Updated 5 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Search for potential frontable domains☆644Mar 22, 2023Updated 2 years ago
- locate and attack Lync/Skype for Business☆346Oct 1, 2024Updated last year
- Find specific users in active directory via their username and logon IP address☆385Mar 21, 2020Updated 5 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆260Apr 6, 2021Updated 4 years ago
- Chameleon: A tool for evading Proxy categorisation☆515Nov 28, 2024Updated last year
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆214Nov 26, 2020Updated 5 years ago
- This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes thr…☆196Jul 26, 2020Updated 5 years ago