SpiderLabs / scavengerLinks
scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders as well as "interesting" files containing sensitive information.
β337Updated 6 years ago
Alternatives and similar repositories for scavenger
Users that are interested in scavenger are comparing it to the libraries listed below
Sorting:
- Enumerate information from NTLM authentication enabled web endpoints πβ490Updated last year
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)β67Updated 3 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.β247Updated last year
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Resultsβ197Updated last year
- Disposable and resilient red team infrastructure with Terraformβ270Updated 6 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentestingβ190Updated 5 years ago
- LinkedIn reconnaissance toolβ54Updated 3 years ago
- β392Updated last month
- Chameleon: A tool for evading Proxy categorisationβ501Updated 8 months ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.β277Updated last year
- β150Updated 2 years ago
- Network Pivoting Toolkitβ452Updated last year
- Kerberoast attack -pure python-β438Updated last year
- Microsoft External Attack Toolβ179Updated 2 years ago
- Python script that performs email address validation against Office 365 without submitting login attempts.β357Updated 4 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurationsβ254Updated 2 years ago
- β334Updated 2 years ago
- Active Directory Lab for Penetration Testingβ53Updated 2 weeks ago
- Parse .nessus file(s) and shows output in interactive UIβ155Updated 3 months ago
- Red Team C2 Infrastructure built in AWS using Ansible!β230Updated 4 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissanceβ¦β451Updated 7 years ago
- gather gather gatherβ582Updated 4 months ago
- This is a weaponized WSUS exploitβ286Updated 2 years ago
- Weaponizing Splunk with reverse and bind shells.β183Updated 8 years ago
- A curated list of awesome BloodhoundAD resourcesβ234Updated 2 years ago
- nnposter's alternate fingerprint dataset for Nmap script http-default-accountsβ251Updated last month
- Overlord - Red Teaming Infrastructure Automationβ626Updated last year
- Ansible playbook to deploy a phishing engagement in the cloud.β219Updated 3 years ago
- A Python script to collect campaign data from Gophish and generate a reportβ192Updated 2 years ago
- Search for potential frontable domainsβ632Updated 2 years ago