N1ckDunn / DataBouncingLinks
☆43Updated last year
Alternatives and similar repositories for DataBouncing
Users that are interested in DataBouncing are comparing it to the libraries listed below
Sorting:
- fully async implementation of Dirkjan's ROADTools☆34Updated 10 months ago
- tool for identifying guest relationships between companies☆102Updated last year
- ☆42Updated 8 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Living Off the Foreign Land setup scripts☆74Updated 11 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Updated 2 years ago
- DEFCON 31 slide deck and video link☆66Updated 8 months ago
- Microsoft365 Device Code Phishing Framework☆39Updated 4 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆42Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆39Updated last year
- Top hashpwn rules☆21Updated last month
- ☆68Updated 3 years ago
- Script to perform some hashcracking logic automagically☆80Updated 2 months ago
- Artifact monitoring that ensures fairplay☆79Updated last year
- HTML Smuggling with Web Assembly☆66Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Updated last year
- LinkedIn recon the easy way☆110Updated 7 months ago
- self-hosted Azure OSINT tool☆32Updated 7 months ago
- Leak NTLM via Website tab in teams via MS Office☆78Updated last year
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆46Updated 7 months ago
- POC for DLL Proxying / Hijacking☆63Updated 8 months ago
- AutoPoC Generator HoneyPoC☆36Updated 2 months ago
- using graph proxy to monitor teams user presence☆55Updated last year
- ☆65Updated 3 weeks ago
- CVE-2013-4786 Go exploitation tool☆40Updated 2 months ago
- Discord C2 Profile for Mythic☆33Updated 11 months ago
- Repository of Volatility3 plugins☆22Updated 2 years ago