Wh1t3Rh1n0 / IceScraperLinks
The CAPTCHA-resilient contact scraper.
☆18Updated 9 months ago
Alternatives and similar repositories for IceScraper
Users that are interested in IceScraper are comparing it to the libraries listed below
Sorting:
- Efflanrs - GUI for Snaffler Output☆26Updated 10 months ago
- pysnaffler☆100Updated 4 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆94Updated 2 years ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆104Updated this week
- Custom queries list for BloodHound☆29Updated last week
- ☆25Updated 2 years ago
- Malware As A Service☆134Updated last year
- ☆63Updated 5 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆175Updated last year
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆44Updated last year
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆41Updated this week
- AzureAD Pentest☆21Updated 3 years ago
- A Python POC for CRED1 over SOCKS5☆151Updated 9 months ago
- Parses Snaffler output file and generate beautified outputs.☆105Updated 5 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆31Updated 6 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆74Updated last year
- ☆147Updated 3 months ago
- ☆63Updated last month
- ☆72Updated last week
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆125Updated this week
- Modular Enumeration and Password Spraying Framework☆121Updated last year
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆41Updated last year
- A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Villag…☆22Updated 2 years ago
- ☆13Updated 3 months ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆123Updated 5 years ago
- Collection of tools to use with Azure Applications☆109Updated last year
- Python utility that generates "imageless" QR codes in various formats☆124Updated 11 months ago
- ☆105Updated last year
- linikatz is a tool to attack AD on UNIX☆149Updated last year
- Cortex XDR Config Extractor☆132Updated 2 years ago