a6avind / spoofcheckLinks
Spoofcheck
☆38Updated 2 weeks ago
Alternatives and similar repositories for spoofcheck
Users that are interested in spoofcheck are comparing it to the libraries listed below
Sorting:
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆45Updated 2 years ago
- Open-Source Phishing Toolkit☆19Updated 4 years ago
- Azure Service Subdomain Enumeration☆60Updated 9 months ago
- ☆47Updated 3 years ago
- ☆25Updated 3 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆42Updated 3 years ago
- A repository of tools developed while studying for OSEP. The contents here are not part of courseware but some tools, i wrote as an exten…☆2Updated last year
- List of some AD tools I frequently use☆46Updated 4 months ago
- Crackmapexec custom scripts used in my internal pentests.☆24Updated last year
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆22Updated 4 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 7 months ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Custom queries list for BloodHound☆28Updated 9 months ago
- ☆93Updated last year
- Vulnerable Windows Application☆16Updated last year
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆16Updated last year
- ☆40Updated this week
- ☆31Updated 3 years ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆96Updated last year
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆50Updated last year
- AzureAD Pentest☆19Updated 3 years ago
- This cheatsheet contains Active Directory (AD) exploitation techniques, showcasing methods used to identify and abuse misconfigurations o…☆40Updated last year
- Determine the running software version of a remote F5 BIG-IP management interface.☆66Updated last year
- ☆20Updated 3 years ago
- ☆15Updated 3 years ago
- Just some random small tools for dealing with asp.net Forms Authentication Cookies☆23Updated 3 years ago
- Python script for extracting and decrypting Group Policy Preferences passwords☆23Updated 4 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆38Updated last year
- ☆69Updated last week