dcsync / recontoolsLinks
discover IP ranges. check email security. survey domains.
☆38Updated 2 years ago
Alternatives and similar repositories for recontools
Users that are interested in recontools are comparing it to the libraries listed below
Sorting:
- Service Enumeration C# .NET Assembly☆58Updated 3 years ago
- Iterative AD discovery toolkit for offensive operations☆87Updated 5 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆99Updated 2 years ago
- ☆70Updated 4 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- A tool to password spray Jenkins instances☆57Updated 6 years ago
- A web shell for pivoting and lateral movement☆34Updated 7 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆32Updated 6 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆85Updated 2 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆94Updated 2 years ago
- F# Implementation to spawn shellcode☆47Updated 7 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆87Updated 2 years ago
- Electron based screenshot scanner☆68Updated 2 years ago
- ☆53Updated 4 years ago
- UglyEXe - bypass some AVs☆17Updated 5 years ago
- BH Cypher Queries picked up from random places☆38Updated 6 years ago
- Suite of Shellcode Running Utilities☆111Updated 5 years ago
- A C# stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆64Updated 5 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 5 years ago
- Microsoft Applocker evasion tool☆39Updated 5 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Updated 4 years ago
- Exchangelib wrapper for pentesting☆64Updated 4 months ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Updated 5 years ago
- ☆19Updated 4 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- Port of Invoke-Excel4DCOM☆105Updated 5 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago