byt3bl33d3r / EmpireLinks
Empire is a PowerShell and Python 3.x post-exploitation framework.
☆18Updated 5 years ago
Alternatives and similar repositories for Empire
Users that are interested in Empire are comparing it to the libraries listed below
Sorting:
- PowerSploit - A PowerShell Post-Exploitation Framework☆19Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Some useful scripts for CobaltStrike☆11Updated 6 years ago
- A collection of curated Java Deserialization Exploits☆11Updated 7 years ago
- Trying to take the dum-dum out of security☆12Updated 8 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Updated 3 years ago
- SMBMap is a handy SMB enumeration tool☆38Updated last year
- Python driver for Wappalyzer, a web application detection utility.☆11Updated 5 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- ☆53Updated 4 years ago
- LDAP library for auditing MS AD☆13Updated last year
- A full-fledged msfrpc library for Metasploit framework.☆13Updated 8 years ago
- TXT and PDF documents from the NSA☆15Updated 10 years ago
- A collection of modifed PowerShell Scripts for CrackMapExec (https://github.com/byt3bl33d3r/CrackMapExec)☆54Updated 6 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 4 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆27Updated 5 years ago
- brute force SSH public-key authentication☆77Updated 2 months ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆83Updated 4 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆39Updated 2 years ago
- A Remote Access Tool using Google Apps Script as the proxy for command and control.☆114Updated 3 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- ☆33Updated 7 months ago
- Sniffs sensitive data from interface or pcap☆16Updated 7 years ago
- WebHook for Red Team☆26Updated 4 years ago