Mass target enumeration
☆32Apr 3, 2021Updated 4 years ago
Alternatives and similar repositories for scope_creep
Users that are interested in scope_creep are comparing it to the libraries listed below
Sorting:
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆85Nov 21, 2024Updated last year
- Less sugar (entropy) for your binaries☆33Sep 10, 2025Updated 5 months ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- A cross-platform, collaborative C2 for red-teaming. Agents are cross-compilable (e.g, you can generate Windows DLLs on Linux), cross-comp…☆24Mar 7, 2025Updated 11 months ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Content from THOTCON 0xa talk☆10May 5, 2019Updated 6 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- A dotnet executable to get an Entra token in an authenticated runtime☆17Oct 30, 2024Updated last year
- ☆12Oct 15, 2024Updated last year
- Red Team Coin for crypto-mining operations.☆23Updated this week
- ☆14Sep 26, 2023Updated 2 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago
- a prompt injection scanner for custom LLM applications☆21Feb 16, 2025Updated last year
- A small script that automates Entra ID persistence with Windows Hello For Business key☆65Feb 16, 2025Updated last year
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- Dumping LSA secrets: a story about task decorrelation☆14Jul 9, 2024Updated last year
- A simple web viewer for TruffleHog JSON output.☆19Jan 7, 2026Updated last month
- Manage and maintain Defender XDR custom collection configuration☆33Nov 19, 2025Updated 3 months ago
- Groovy Post Exploitation☆20Oct 21, 2024Updated last year
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 7 months ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- A C++/Asm template for PIC/EXE/DLL malware☆24Aug 12, 2025Updated 6 months ago
- Ansible roles to deploy RedELK☆23Feb 15, 2023Updated 3 years ago
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆37Aug 31, 2025Updated 6 months ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆80Mar 30, 2023Updated 2 years ago
- Mythic Scripting PyPi package - mythic☆28Oct 10, 2025Updated 4 months ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Feb 9, 2026Updated 3 weeks ago
- Collection of osint related links original posted by Tr1gger on raidforums.com which Tr1gger had copied from the @i_intelligence handbook☆21Jul 9, 2018Updated 7 years ago
- Phishing Framework for Pentesters☆201May 16, 2023Updated 2 years ago
- Random IP Dialer for your subnet and SOCKS Proxy☆24Sep 1, 2025Updated 6 months ago
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- ☆48May 12, 2021Updated 4 years ago
- This python script performs a number of sqlite queries (mainly password metadata) against sqlite databases (Created by ROADtools) to prov…☆22Jul 3, 2024Updated last year
- Python3 rewrite of AsOutsider features of AADInternals☆60Jul 23, 2025Updated 7 months ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated 11 months ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆23Apr 22, 2017Updated 8 years ago