dafthack / PowerMetaLinks
PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and Bing searches. It then allows for the download of those files from the target domain. After retrieving the files, the metadata associated with them can be analyzed by PowerMeta. Some interesting things commonl…
☆564Updated 4 months ago
Alternatives and similar repositories for PowerMeta
Users that are interested in PowerMeta are comparing it to the libraries listed below
Sorting:
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆460Updated 8 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆367Updated last year
- Password spraying using AWS Lambda for IP rotation☆649Updated 2 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆634Updated 8 years ago
- Domain Password Audit Tool for Pentesters☆1,001Updated this week
- ☆283Updated 7 years ago
- Credential and Red Teaming Defense for Windows Environments☆329Updated last year
- Search for categorized domain☆451Updated 6 years ago
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆202Updated last year
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449Updated 3 years ago
- Post Exploitation Wiki☆526Updated 5 years ago
- ☆395Updated last week
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399Updated 5 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆306Updated 5 years ago
- Egress-Assess is a tool used to test egress data detection capabilities☆685Updated 2 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆381Updated 5 years ago
- Pipal, THE password analyser☆654Updated 2 years ago
- ☆209Updated 7 years ago
- NetSPI PowerShell Scripts☆335Updated 9 months ago
- Issues to consider when planning a red team exercise.☆618Updated 8 years ago
- ☆402Updated 5 years ago
- A Powershell Privilege Escalation Enumeration Script.☆313Updated 7 years ago
- Active Directory forensic framework☆325Updated 3 years ago
- The Old BloodHound C# Ingestor (Deprecated)☆511Updated 3 years ago
- ☆237Updated 5 years ago
- Easy 802.1Q VLAN Hopping☆382Updated 9 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated last year
- The aim of Wordsmith is to assist with creating tailored wordlists. This is mostly based on geolocation.☆170Updated 7 years ago
- Respounder detects presence of responder in the network.☆319Updated 6 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆399Updated last year