Wh1t3Rh1n0 / dns-triageLinks
A simple Python script to do quick, targeted recon of a given domain.
☆17Updated 3 months ago
Alternatives and similar repositories for dns-triage
Users that are interested in dns-triage are comparing it to the libraries listed below
Sorting:
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- A user enumeration tool for Slack.☆30Updated last year
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- Lifetime AMSI bypass.☆35Updated 2 months ago
- Payload Generation Workflow☆39Updated last month
- Your Skyfall Infrastructure Pack☆76Updated 2 months ago
- Deploy a phishing infrastructure on the fly.☆71Updated 6 months ago
- Utilities for obfuscating shellcode☆69Updated 4 months ago
- Logging tool intended for red team usage☆31Updated 2 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆86Updated last week
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆16Updated 4 months ago
- ☆32Updated last month
- Discord C2 Profile for Mythic☆30Updated 5 months ago
- ☆28Updated 2 years ago
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆48Updated 4 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 3 months ago
- Most Responder's configuration power in your hand.☆51Updated 6 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- Automated Evilginx phishlet creator Extension for Burpsuite☆53Updated 6 months ago
- Microsoft365 Device Code Phishing Framework☆37Updated 3 years ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆23Updated 2 years ago
- ☆38Updated last month
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- ☆50Updated 8 months ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 2 years ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆63Updated 2 months ago
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆27Updated this week
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆62Updated last year
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆19Updated 3 months ago