OOAFA / squeegee
A collection of tools using OCR to extract potential usernames from RDP screenshots.
☆30Updated 11 months ago
Alternatives and similar repositories for squeegee:
Users that are interested in squeegee are comparing it to the libraries listed below
- Extract registry and NTDS secrets from local or remote disk images☆37Updated 2 weeks ago
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- Scripts to interact with Microsoft Graph APIs☆36Updated 4 months ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆19Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆30Updated 3 weeks ago
- Nemesis agent for Mythic☆27Updated 7 months ago
- Validates priv escalation of AD trusts☆35Updated 3 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 10 months ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆38Updated last year
- Some of my custom "tools".☆22Updated 3 years ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆37Updated last month
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- ☆18Updated last year
- ☆17Updated 3 months ago
- ☆15Updated 5 months ago
- Smuggle a file to a user's browser☆19Updated 2 years ago
- A simple to use single-include Windows API resolver☆20Updated 8 months ago
- DFSCoerce exe revisited version with custom authentication☆38Updated last year
- ☆19Updated 5 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆31Updated last month
- ☆21Updated last year
- The Totally Legit Authentication Dialog☆12Updated last year
- Extension functionality for the NightHawk operator client☆27Updated last year
- Linux CS bypass technique☆29Updated last month
- ☆19Updated last year
- ☆26Updated last year
- Enumerate the Domain for Readable and Writable Shares☆17Updated last month