Fast website scraper and wordlist generator
☆82May 6, 2025Updated 9 months ago
Alternatives and similar repositories for skweez
Users that are interested in skweez are comparing it to the libraries listed below
Sorting:
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Nov 14, 2020Updated 5 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- Lookup for interesting stuff in SMB shares☆150Jun 16, 2023Updated 2 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- ☆17Jan 9, 2025Updated last year
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Jun 2, 2018Updated 7 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- Checks for signature requirements over LDAP☆98Oct 11, 2022Updated 3 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆57Jan 14, 2026Updated last month
- Syscall BOF to arbitrarily add/detract process token privilege rights.☆61Jul 10, 2024Updated last year
- Easy red team phishing with Puppeteer☆132Feb 6, 2023Updated 3 years ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago
- NTLM relaying for Windows made easy☆579Apr 25, 2023Updated 2 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Jan 26, 2022Updated 4 years ago
- Collection of CobaltStrike beacon object files☆105Feb 14, 2022Updated 4 years ago
- Password spraying and bruteforcing tool for Active Directory Domain Services☆385Oct 27, 2024Updated last year
- SMBExec C# module☆219Aug 21, 2020Updated 5 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- Active Directory Password Spray Testing Utility in Go☆18Mar 22, 2024Updated last year
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- Modular Enumeration and Password Spraying Framework☆129Apr 10, 2024Updated last year
- .NET 4.0 WinRM API Command Execution☆166Sep 11, 2020Updated 5 years ago
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆100Dec 8, 2022Updated 3 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆820Oct 27, 2023Updated 2 years ago
- ☆54Jan 21, 2025Updated last year
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 5 years ago
- ☆53Sep 16, 2021Updated 4 years ago
- User enumeration with Microsoft Teams API☆175Jul 9, 2021Updated 4 years ago
- ☆199Aug 28, 2025Updated 6 months ago