antman1p / Conf-ThiefLinks
A Red Team tool for exfiltrating sensitive data from Confluence pages.
☆114Updated 2 years ago
Alternatives and similar repositories for Conf-Thief
Users that are interested in Conf-Thief are comparing it to the libraries listed below
Sorting:
- Exchangelib wrapper for pentesting☆67Updated 10 months ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆86Updated 2 years ago
- Lookup for interesting stuff in SMB shares☆151Updated 2 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆100Updated 2 years ago
- Creates and sends fake meeting invite☆73Updated 4 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆97Updated last year
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆58Updated 4 years ago
- ☆59Updated 2 years ago
- ☆129Updated 2 years ago
- Rewriting SIET to python3☆56Updated last year
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆49Updated 3 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 4 years ago
- PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10…☆35Updated 3 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆86Updated 2 years ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆190Updated 2 years ago
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆106Updated last year
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆77Updated 3 weeks ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- An Ansible role for installing Cobalt Strike.☆80Updated last week
- Checks for signature requirements over LDAP☆98Updated 3 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 3 years ago
- ☆10Updated 4 years ago
- A python based script to update DNS entries in ADIDNS☆43Updated last year
- LDAP Querying without the Suck☆110Updated last year
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- A tool to password spray Jenkins instances☆59Updated 6 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 4 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Updated 5 years ago
- Some scripts to support with importing large datasets into BloodHound☆81Updated 2 years ago