OtterHacker / ShareFouine
☆48Updated 3 months ago
Alternatives and similar repositories for ShareFouine:
Users that are interested in ShareFouine are comparing it to the libraries listed below
- Leveraging AWS Lambda Function URLs for C2 Redirection☆26Updated last year
- Lifetime AMSI bypass.☆35Updated 7 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆39Updated last month
- Deploy a phishing infrastructure on the fly.☆66Updated last month
- Microsoft Graph API post-exploitation toolkit☆93Updated 6 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆103Updated 9 months ago
- Impacket pre-compiled binaries☆15Updated last year
- ☆64Updated 10 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆35Updated 2 months ago
- ☆83Updated 2 years ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆68Updated 8 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 8 months ago
- A Python POC for CRED1 over SOCKS5☆139Updated 3 months ago
- Extract registry and NTDS secrets from local or remote disk images☆36Updated 4 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆66Updated 4 months ago
- Sniffing files generator☆50Updated 2 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆108Updated 8 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆83Updated 7 months ago
- Living off the land searches for explorer and sharepoint☆54Updated 3 months ago
- TokenCert☆92Updated 2 months ago
- Enumerate the Domain for Readable and Writable Shares☆16Updated 7 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 7 months ago
- ☆39Updated this week
- Python module for running BOFs☆64Updated last year
- Source code and examples for PassiveAggression☆54Updated 7 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆68Updated 8 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 6 months ago
- A helper script for consolidating Aggressor and BOF repositories into a single CNA for Cobalt Strike.☆13Updated 9 months ago
- ☆48Updated 3 months ago
- ☆43Updated 6 months ago