SpiderLabs / scavenger
scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders as well as "interesting" files containing sensitive information.
β329Updated 5 years ago
Related projects β
Alternatives and complementary repositories for scavenger
- Enumerate information from NTLM authentication enabled web endpoints πβ466Updated 4 months ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)β62Updated 2 years ago
- Kerberoast attack -pure python-β421Updated 11 months ago
- Chameleon: A tool for evading Proxy categorisationβ459Updated 2 years ago
- Disposable and resilient red team infrastructure with Terraformβ253Updated 5 years ago
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Resultsβ185Updated 4 months ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.β245Updated 6 months ago
- β332Updated last year
- LDAP library for auditing MS ADβ366Updated 2 months ago
- Network Pivoting Toolkitβ435Updated last year
- Red Team C2 Infrastructure built in AWS using Ansible!β220Updated 4 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.β216Updated 2 years ago
- Active Directory ACL exploitation with BloodHoundβ703Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Frameworkβ216Updated 2 years ago
- scan for NTLM directoriesβ346Updated 4 months ago
- β147Updated last year
- RACE is a PowerShell module for executing ACL attacks against Windows targets.β212Updated last year
- LinkedIn reconnaissance toolβ48Updated 2 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.β245Updated 5 months ago
- β370Updated last month
- Malicious WMI Events using PowerShellβ370Updated 8 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to β¦β733Updated last month
- Microsoft External Attack Toolβ177Updated last year
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilitiesβ201Updated 4 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.β251Updated 3 years ago
- Maximizing BloodHound. Max is a good boy.β501Updated 3 months ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissanceβ¦β434Updated 7 years ago
- Rapid Attack Infrastructure (RAI)β297Updated 3 years ago
- Custom Query list for the Bloodhound GUI based off my cheatsheetβ750Updated last year