SpiderLabs / scavengerLinks
scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders as well as "interesting" files containing sensitive information.
β340Updated 7 years ago
Alternatives and similar repositories for scavenger
Users that are interested in scavenger are comparing it to the libraries listed below
Sorting:
- Enumerate information from NTLM authentication enabled web endpoints πβ500Updated 2 months ago
- Disposable and resilient red team infrastructure with Terraformβ279Updated 6 years ago
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Resultsβ203Updated last year
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)β68Updated 3 years ago
- Kerberoast attack -pure python-β436Updated 2 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.β288Updated last year
- β397Updated last month
- Chameleon: A tool for evading Proxy categorisationβ507Updated last year
- β154Updated this week
- LinkedIn reconnaissance toolβ55Updated 3 years ago
- β333Updated 2 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentestingβ192Updated 5 years ago
- Network Pivoting Toolkitβ457Updated 2 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissanceβ¦β464Updated 8 years ago
- Python script that performs email address validation against Office 365 without submitting login attempts.β371Updated 5 years ago
- gather gather gatherβ585Updated 8 months ago
- Microsoft External Attack Toolβ178Updated 2 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.β247Updated last year
- Ansible playbook to deploy a phishing engagement in the cloud.β223Updated 3 years ago
- This is a weaponized WSUS exploitβ296Updated 3 years ago
- β237Updated 5 years ago
- Parse .nessus file(s) and shows output in interactive UIβ161Updated 7 months ago
- Weaponizing Splunk with reverse and bind shells.β182Updated 8 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.β236Updated 2 years ago
- Active Directory Lab for Penetration Testingβ52Updated 4 months ago
- Red Team C2 Infrastructure built in AWS using Ansible!β231Updated 5 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to β¦β758Updated last year
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurationsβ255Updated 3 years ago
- A Python script to collect campaign data from Gophish and generate a reportβ198Updated 3 years ago
- A curated list of awesome BloodhoundAD resourcesβ235Updated 3 years ago