dafthack / PowerMeta
PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and Bing searches. It then allows for the download of those files from the target domain. After retrieving the files, the metadata associated with them can be analyzed by PowerMeta. Some interesting things commonl…
☆551Updated 2 years ago
Alternatives and similar repositories for PowerMeta:
Users that are interested in PowerMeta are comparing it to the libraries listed below
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆442Updated 7 years ago
- Password spraying using AWS Lambda for IP rotation☆598Updated 2 years ago
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆192Updated 8 months ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆379Updated 5 years ago
- Domain Password Audit Tool for Pentesters☆945Updated 2 years ago
- Search for categorized domain☆444Updated 6 years ago
- ☆281Updated 7 years ago
- ☆379Updated 2 weeks ago
- Credential and Red Teaming Defense for Windows Environments☆325Updated 8 months ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆364Updated 7 months ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆633Updated 7 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆448Updated 2 years ago
- locate and attack Lync/Skype for Business☆335Updated 5 months ago
- Rapid Attack Infrastructure (RAI)☆302Updated 3 months ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆305Updated 4 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆393Updated 4 years ago
- Post Exploitation Wiki☆515Updated 5 years ago
- A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)☆735Updated 9 months ago
- Network Pivoting Toolkit☆440Updated last year
- The Old BloodHound C# Ingestor (Deprecated)☆512Updated 2 years ago
- Issues to consider when planning a red team exercise.☆615Updated 7 years ago
- Remote Recon and Collection☆448Updated 7 years ago
- This repo contains my custom scripts for Penetration Testing and Red Team Assessments. I will keep on updating this repo as and when I ge…☆350Updated 6 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,120Updated 4 months ago
- Egress-Assess is a tool used to test egress data detection capabilities☆637Updated last year
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆381Updated 8 months ago
- NetSPI PowerShell Scripts☆330Updated last month
- Chameleon: A tool for evading Proxy categorisation☆484Updated 3 months ago
- PowerShell Remote Download Cradle Generator & Obfuscator☆830Updated 6 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆395Updated last year