LaresLLC / ScrapingKit
Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if you have popped a user's desktop and their outlook client.
☆98Updated last year
Alternatives and similar repositories for ScrapingKit:
Users that are interested in ScrapingKit are comparing it to the libraries listed below
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.☆83Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated last month
- ☆51Updated last year
- PowerShell Reverse Shell☆61Updated last year
- ☆47Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆106Updated 2 months ago
- 🌩️ Collection of BloodHound queries for Azure☆60Updated 2 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆111Updated last week
- My Favorite Offensive Security Scripts☆68Updated last year
- Discord C2 Profile for Mythic☆28Updated last month
- C2 Automation using Linode☆80Updated 2 years ago
- BloodHound PowerShell client☆51Updated last week
- A C2 framework built for my bachelors thesis☆55Updated 4 months ago
- ☆40Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 5 months ago
- linikatz is a tool to attack AD on UNIX☆144Updated last year
- tool for identifying guest relationships between companies☆84Updated 8 months ago
- Easy red team phishing with Puppeteer☆128Updated 2 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆77Updated 9 months ago
- quick and dirty proof-of-concept to hide shells in images☆49Updated 8 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆111Updated 2 months ago
- Living Off the Foreign Land setup scripts☆65Updated 3 weeks ago
- ☆26Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆137Updated 8 months ago
- ☆26Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated last year
- ☆34Updated last year