VasilyKaiser / aquasilyLinks
A Tool for Domain Flyovers - my version of michenriksen's aquatone
☆10Updated 2 years ago
Alternatives and similar repositories for aquasily
Users that are interested in aquasily are comparing it to the libraries listed below
Sorting:
- Bypass Constrained Language Mode in PowerShell☆30Updated 6 years ago
- ☆27Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 7 months ago
- ☆52Updated last year
- Custom queries list for BloodHound☆29Updated 2 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Updated 5 years ago
- Creates and sends fake meeting invite☆70Updated 4 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Modified version of PEAS client for offensive operations☆42Updated 2 years ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆78Updated 10 months ago
- Discord C2 Profile for Mythic☆32Updated 7 months ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- Federated Office365 user enumeration based on correlated response trend analysis☆51Updated 3 years ago
- Remote Template Injection Toolkit☆43Updated last year
- ☆16Updated last year
- IAT Unhooking proof-of-concept☆30Updated last year
- Scripts that automate portions of pentests.☆52Updated last month
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated 2 years ago
- ☆28Updated 2 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆25Updated last year
- Deploy a phishing infrastructure on the fly.☆75Updated 8 months ago
- A small red team course☆39Updated 2 years ago
- fully async implementation of Dirkjan's ROADTools☆32Updated 6 months ago
- ☆44Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆77Updated 2 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆66Updated last year