a6avind / spoofcheckLinks
Spoofcheck
☆46Updated 7 months ago
Alternatives and similar repositories for spoofcheck
Users that are interested in spoofcheck are comparing it to the libraries listed below
Sorting:
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 3 years ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆124Updated 4 months ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- ☆19Updated 3 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆147Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆128Updated last month
- ☆39Updated 3 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆30Updated 3 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆100Updated 2 years ago
- ☆163Updated last year
- ☆27Updated 3 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆24Updated 11 months ago
- Azure Service Subdomain Enumeration☆69Updated last year
- Crackmapexec custom scripts used in my internal pentests.☆25Updated 2 years ago
- ☆93Updated 5 years ago
- ☆34Updated 3 years ago
- CVE-2023-20198 Exploit PoC☆61Updated 2 years ago
- CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script w…☆24Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- ☆27Updated 3 years ago
- Open-Source Phishing Toolkit☆19Updated 4 years ago
- ☆95Updated 5 months ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆185Updated 2 years ago
- ☆91Updated 2 years ago
- MOVEit CVE-2023-34362☆138Updated 2 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆69Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆178Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- List of some AD tools I frequently use☆54Updated 2 months ago