blurbdust / needleView external linksLinks
☆40Mar 25, 2021Updated 4 years ago
Alternatives and similar repositories for needle
Users that are interested in needle are comparing it to the libraries listed below
Sorting:
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆13Dec 5, 2025Updated 2 months ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Oct 30, 2018Updated 7 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆50May 3, 2022Updated 3 years ago
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆79Apr 2, 2025Updated 10 months ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- A script used to query the dehashed API and filter for more useful results☆17Jun 20, 2021Updated 4 years ago
- ☆11Feb 13, 2024Updated 2 years ago
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- WMI SA stuffs☆30Apr 18, 2022Updated 3 years ago
- ☆167Feb 29, 2024Updated last year
- .NET Project for performing Authenticated Remote Execution☆12Nov 22, 2023Updated 2 years ago
- ☆40Oct 8, 2024Updated last year
- Linux Kernel Module Rootkit with module hiding, RCE/reverse shell, and persistence capabilities☆15Feb 23, 2023Updated 2 years ago
- A PowerShell script to parse the docx/docm file format and update the template location.☆17Oct 15, 2019Updated 6 years ago
- Updated version of a long known self deletion technique to work with 24H2.☆61Jun 9, 2025Updated 8 months ago
- AzDevRecon is a powerful web-based enumeration tool for offensive security professionals, red teamers, and pentesters targeting Azure Dev…☆25Oct 13, 2025Updated 4 months ago
- A simple Toolkit to BF and decrypt Windows EntraId CacheData☆20Jun 20, 2024Updated last year
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆40Mar 23, 2024Updated last year
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated 10 months ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated 11 months ago
- ☆80Aug 2, 2023Updated 2 years ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆37Nov 22, 2025Updated 2 months ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Sep 4, 2019Updated 6 years ago
- ADSI based SA tool☆17Apr 9, 2022Updated 3 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆20Feb 8, 2024Updated 2 years ago
- ☆18May 14, 2025Updated 8 months ago
- ADCS abuser☆311Feb 6, 2023Updated 3 years ago
- Simple netexec wraper with html repport☆19May 19, 2024Updated last year
- Kerberos protocol attacker☆140Feb 1, 2021Updated 5 years ago
- ☆23May 27, 2024Updated last year
- A collection of Neo4j/BloodHound queries to collect interesting information.☆47May 9, 2022Updated 3 years ago
- ☆52Oct 29, 2024Updated last year
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆107Aug 18, 2025Updated 5 months ago
- Maximizing BloodHound. Max is a good boy.☆531Apr 25, 2025Updated 9 months ago
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago