atredispartners / flamingoLinks
Flamingo captures credentials sprayed across the network by various IT and security products.
☆476Updated last month
Alternatives and similar repositories for flamingo
Users that are interested in flamingo are comparing it to the libraries listed below
Sorting:
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆187Updated last year
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆378Updated 4 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆223Updated 4 years ago
- Golang reverse/bind shell generator☆229Updated 3 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆213Updated 4 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆605Updated last year
- ☄️ go-out - A Golang egress buster.☆129Updated last year
- Goca Scanner☆329Updated last year
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆261Updated 2 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆497Updated last year
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆192Updated 5 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆230Updated 4 years ago
- goddi (go dump domain info) dumps Active Directory domain information☆429Updated 3 years ago
- User enumeration with Microsoft Teams API☆174Updated 4 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆67Updated 3 years ago
- A simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams/Lark/Telegram & Pushover support☆299Updated last month
- LinkedIn reconnaissance tool☆54Updated 3 years ago
- ☆395Updated 2 months ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆338Updated 6 years ago
- gather gather gather☆582Updated 5 months ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆389Updated 4 years ago
- An open source swiss army knife for arbitrary communication over application protocols☆243Updated 4 years ago
- Kerberoast attack -pure python-☆438Updated last year
- A framework for stealthy domain reconnaissance☆302Updated 3 years ago
- Chameleon: A tool for evading Proxy categorisation☆506Updated 9 months ago
- Tool to extract Kerberos tickets from Linux kernel keys.☆232Updated 6 years ago
- A tool that implements the Golden SAML attack☆337Updated 6 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆281Updated last year
- Respounder detects presence of responder in the network.☆318Updated 6 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆191Updated 3 years ago