grahamhelton / dehashQuery
A script used to query the dehashed API and filter for more useful results
☆15Updated 3 years ago
Alternatives and similar repositories for dehashQuery:
Users that are interested in dehashQuery are comparing it to the libraries listed below
- ☆16Updated 10 months ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆20Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- This repository presents a proof-of-concept of CVE-2023-22527☆13Updated last year
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Analyzes AdminSDHolder permissions & compares with a previous run, to detect potential backdoor/excessive persistent permission(s)☆14Updated last year
- OSED Practice binary☆24Updated last year
- ManageEngine ADManager Command Injection☆12Updated last year
- ☆21Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Updated 6 months ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- ShootCutMe an .LNK file creator tool for redteamer☆13Updated 4 months ago
- A simple to use single-include Windows API resolver☆19Updated 7 months ago
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 10 months ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated last year
- FireProx written in Go☆19Updated 10 months ago
- ☆46Updated 2 years ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆37Updated last year
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆13Updated 2 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆12Updated 2 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- ☆25Updated last year
- ☆15Updated 2 years ago