SpiderLabs / scavengerLinks
scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders as well as "interesting" files containing sensitive information.
β338Updated 6 years ago
Alternatives and similar repositories for scavenger
Users that are interested in scavenger are comparing it to the libraries listed below
Sorting:
- Enumerate information from NTLM authentication enabled web endpoints πβ495Updated last week
- Disposable and resilient red team infrastructure with Terraformβ277Updated 6 years ago
- β152Updated 2 years ago
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Resultsβ200Updated last year
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)β67Updated 3 years ago
- LinkedIn reconnaissance toolβ54Updated 3 years ago
- β394Updated 3 weeks ago
- Network Pivoting Toolkitβ451Updated 2 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.β247Updated last year
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.β284Updated last year
- Chameleon: A tool for evading Proxy categorisationβ507Updated 10 months ago
- Kerberoast attack -pure python-β436Updated last year
- β333Updated 2 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!β230Updated 5 years ago
- Microsoft External Attack Toolβ179Updated 2 years ago
- ATTPwnβ215Updated last year
- This is a weaponized WSUS exploitβ290Updated 2 years ago
- Active Directory Lab for Penetration Testingβ52Updated 2 months ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissanceβ¦β458Updated 8 years ago
- Python script that performs email address validation against Office 365 without submitting login attempts.β366Updated 5 years ago
- Parse .nessus file(s) and shows output in interactive UIβ157Updated 5 months ago
- Ansible playbook to deploy a phishing engagement in the cloud.β221Updated 3 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vulnβ192Updated 4 years ago
- Weaponizing Splunk with reverse and bind shells.β181Updated 8 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.β232Updated 2 years ago
- β237Updated 4 years ago
- Overlord - Red Teaming Infrastructure Automationβ627Updated last year
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.β255Updated 4 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentestingβ192Updated 5 years ago
- Malicious WMI Events using PowerShellβ391Updated 9 years ago