antman1p / Conf-ThiefView external linksLinks
A Red Team tool for exfiltrating sensitive data from Confluence pages.
☆114Feb 21, 2023Updated 2 years ago
Alternatives and similar repositories for Conf-Thief
Users that are interested in Conf-Thief are comparing it to the libraries listed below
Sorting:
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Jul 2, 2021Updated 4 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆50Dec 8, 2022Updated 3 years ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆59Sep 2, 2021Updated 4 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆86Feb 21, 2023Updated 2 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆190Mar 19, 2023Updated 2 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- Zoom Persistence Aggressor and Handler☆55Mar 24, 2021Updated 4 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- ☆415Apr 28, 2021Updated 4 years ago
- ☆108Oct 14, 2021Updated 4 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Jul 29, 2021Updated 4 years ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆220Aug 23, 2022Updated 3 years ago
- ☆61Aug 30, 2021Updated 4 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆67May 9, 2022Updated 3 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago
- A *very* imperfect attempt to correlate Kernel32 function calls to native API (Nt/Zw) counterparts/execution flow.☆28Dec 16, 2021Updated 4 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆347Sep 1, 2021Updated 4 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆272Sep 14, 2023Updated 2 years ago
- Executes position independent shellcode from an encrypted zip☆304Dec 22, 2020Updated 5 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Apr 15, 2021Updated 4 years ago
- Beacon Object Files for roasting Active Directory☆235Feb 21, 2022Updated 3 years ago
- ☆209Feb 24, 2022Updated 3 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- Tracking of offensive macOS tooling, blogs, and related helpful information☆192Nov 18, 2024Updated last year
- macOS Initial Access Payload Generator☆322Jan 10, 2024Updated 2 years ago
- ☆101Aug 23, 2021Updated 4 years ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆246Mar 19, 2024Updated last year
- Evading WinDefender ATP credential-theft☆256Dec 2, 2019Updated 6 years ago
- Azure JWT Token Manipulation Toolset☆711Dec 6, 2024Updated last year
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- An Office365 User Attack Tool☆645Mar 19, 2024Updated last year
- A CLI for deploying red team infrastructure across mutliple cloud providers, all integrated with a virtual Nebula network, and full ELK i…☆120Jul 23, 2023Updated 2 years ago
- Fully modular persistence framework☆258Apr 10, 2023Updated 2 years ago