byt3bl33d3r / EmpireLinks
Empire is a PowerShell and Python 3.x post-exploitation framework.
☆18Updated 5 years ago
Alternatives and similar repositories for Empire
Users that are interested in Empire are comparing it to the libraries listed below
Sorting:
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Some useful scripts for CobaltStrike☆11Updated 6 years ago
- Python driver for Wappalyzer, a web application detection utility.☆11Updated 5 years ago
- A collection of curated Java Deserialization Exploits☆11Updated 7 years ago
- Trying to take the dum-dum out of security☆12Updated 8 years ago
- SMBMap is a handy SMB enumeration tool☆38Updated last year
- Red Team Tool Kit☆16Updated 6 years ago
- A collection of modifed PowerShell Scripts for CrackMapExec (https://github.com/byt3bl33d3r/CrackMapExec)☆55Updated 6 years ago
- Sniffs sensitive data from interface or pcap☆14Updated 7 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Updated 3 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- ☆33Updated 8 months ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- Modern problems require modern solutions☆32Updated 2 years ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Updated 7 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Updated 6 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆27Updated 5 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Updated 10 years ago
- [BASH] Password generator through a wordlist☆11Updated 12 years ago
- Use Tor for anonymous scanning with nmap☆85Updated 10 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆84Updated 4 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- All xxx-arsenal repos in one☆16Updated 6 years ago
- ☆14Updated 7 years ago