Inscyght / Zero-E
Automates the network enumeration process in a fire-and-forget manner, among many more functions. Aims to be the illest Nmap/masscan wrapper alive. Zero effort, zero error network enumeration.
β46Updated 2 months ago
Alternatives and similar repositories for Zero-E:
Users that are interested in Zero-E are comparing it to the libraries listed below
- π©οΈ Collection of BloodHound queries for Azureβ54Updated 3 weeks ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create advβ¦β106Updated 2 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.β35Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-factoβ¦β35Updated 9 months ago
- A Moodle Scannerβ38Updated 2 months ago
- Azure Service Subdomain Enumerationβ47Updated 4 months ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automatβ¦β40Updated 11 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine withβ¦β73Updated 2 months ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify β¦β74Updated 3 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privilegesβ21Updated 2 months ago
- Various AD tools needed for penetration testing in one place.β24Updated last year
- β78Updated 9 months ago
- Advanced Email Threat Hunting w/ Detection as Codeβ48Updated last month
- β53Updated last year
- A tool for quickly evaluating IAM permissions in AWS.β57Updated last year
- BloodHound PowerShell clientβ49Updated this week
- This is an AD pentest tools collectionβ53Updated 6 months ago
- β34Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.β44Updated 10 months ago
- Parses Snaffler output file and generate beautified outputs.β66Updated this week
- Fast Path Traversal exploitation toolβ21Updated 9 months ago
- Living off the land searches for explorer and sharepointβ54Updated 3 months ago
- β52Updated last year
- Source code and examples for PassiveAggressionβ54Updated 7 months ago
- A small executable to trick a user to authenticate using code matching MFAβ68Updated last year
- AWS IAM Username Enumerator and Password Spraying Tool in Python3β25Updated 3 weeks ago
- Tool for analyzing SAP Secure Network Communications (SNC).β51Updated 9 months ago
- β32Updated last year
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.β22Updated 9 months ago
- Dump Kerberos tickets from the KCM database of SSSDβ49Updated 4 months ago