dafthack / PowerMeta
PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and Bing searches. It then allows for the download of those files from the target domain. After retrieving the files, the metadata associated with them can be analyzed by PowerMeta. Some interesting things commonl…
☆550Updated 2 years ago
Alternatives and similar repositories for PowerMeta:
Users that are interested in PowerMeta are comparing it to the libraries listed below
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆437Updated 7 years ago
- Password spraying using AWS Lambda for IP rotation☆583Updated 2 years ago
- Domain Password Audit Tool for Pentesters☆939Updated 2 years ago
- Credential and Red Teaming Defense for Windows Environments☆324Updated 6 months ago
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆191Updated 7 months ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆365Updated 6 months ago
- locate and attack Lync/Skype for Business☆335Updated 4 months ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆446Updated 2 years ago
- ☆281Updated 7 years ago
- Network Pivoting Toolkit☆440Updated last year
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆377Updated 4 years ago
- Search for categorized domain☆443Updated 6 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆631Updated 7 years ago
- ☆377Updated last month
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆305Updated 4 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,116Updated 2 months ago
- NetSPI PowerShell Scripts☆329Updated 3 weeks ago
- Rapid Attack Infrastructure (RAI)☆304Updated 2 months ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆393Updated 4 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆65Updated 3 years ago
- The Old BloodHound C# Ingestor (Deprecated)☆510Updated 2 years ago
- Post Exploitation Wiki☆515Updated 5 years ago
- A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)☆732Updated 8 months ago
- ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.☆228Updated 7 years ago
- A ton of helpful tools☆335Updated 3 years ago
- Issues to consider when planning a red team exercise.☆614Updated 7 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆335Updated 6 years ago
- A Powershell Privilege Escalation Enumeration Script.☆307Updated 6 years ago
- Malicious WMI Events using PowerShell☆379Updated 8 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆811Updated 7 months ago