Reconnaissance tool for Microsoft Office 365
☆69Nov 21, 2018Updated 7 years ago
Alternatives and similar repositories for raindance
Users that are interested in raindance are comparing it to the libraries listed below
Sorting:
- Sustainable shellcode evasion☆113Dec 11, 2024Updated last year
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Dec 8, 2022Updated 3 years ago
- Execute Shellcode And Other Goodies From MMC☆14Jun 17, 2015Updated 10 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 5 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 6 years ago
- C# code to run shellcode in a sneaky way☆93Oct 2, 2020Updated 5 years ago
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆87Jul 2, 2019Updated 6 years ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Apr 22, 2018Updated 7 years ago
- ☆110May 14, 2018Updated 7 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 7 years ago
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Jan 20, 2021Updated 5 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- Proof of concept tool used for phishing multi-factor authentication on O365☆14Aug 8, 2018Updated 7 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Feb 27, 2025Updated last year
- Tool to walk SPF records for relevant domain names and Whois information.☆17May 30, 2019Updated 6 years ago
- ☆98Feb 21, 2019Updated 7 years ago
- F# Implementation to spawn shellcode☆47Jun 6, 2018Updated 7 years ago
- Ansible playbooks to facilitate redteam stuff☆14Aug 2, 2016Updated 9 years ago
- ☆34Jul 23, 2018Updated 7 years ago
- Help recover passwords / etc. that were incorrectly entered with a typo☆13Jan 24, 2017Updated 9 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆20Aug 23, 2019Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- In motherland, target network calls you!☆61Sep 4, 2018Updated 7 years ago
- SMBExec C# module☆219Aug 21, 2020Updated 5 years ago
- ☆58Jul 16, 2017Updated 8 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆372Feb 23, 2024Updated 2 years ago
- Enumerate RIDs using pure Python☆32Jan 5, 2026Updated 2 months ago
- SQLC2 is a PowerShell script for deploying and managing a command and control system that uses SQL Server as both the control server and …☆77Nov 5, 2022Updated 3 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- InfoPath Phishing Repo Resource☆68Oct 26, 2017Updated 8 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118May 31, 2019Updated 6 years ago