Dredging up secrets from the depths of the file system
☆136Nov 4, 2024Updated last year
Alternatives and similar repositories for dredge
Users that are interested in dredge are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆55Apr 1, 2026Updated last month
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆18Dec 29, 2024Updated last year
- This tool automates the process of running FFUF (Fuzz Faster U Fool) and post-processing its results to extract valid URLs. It supports b…☆36Nov 5, 2024Updated last year
- ☆18Jun 25, 2024Updated last year
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆110Oct 31, 2023Updated 2 years ago
- System Call Integrity Layer - experimental security research☆26Apr 14, 2026Updated 3 weeks ago
- This is a Python script that generates a staged payload that fully bypasses MS Defender. Can potentially be used for EDRs with some custo…☆77Mar 31, 2026Updated last month
- ☆41Aug 25, 2024Updated last year
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- Nuke It From Orbit - remove AV/EDR with physical access☆274Dec 8, 2024Updated last year
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆40Jul 23, 2025Updated 9 months ago
- ☆18Oct 28, 2025Updated 6 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Installs and adjusts Pentest tools.☆10Oct 19, 2022Updated 3 years ago
- Limited Windows PE linker (creating .exe from .obj and .dll files for x86 architecture)☆16Jun 15, 2019Updated 6 years ago
- Looks for parameters in urls☆34Oct 14, 2024Updated last year
- Slides from various conferences and talks I've given☆14Oct 12, 2025Updated 6 months ago
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 5 months ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Mar 18, 2024Updated 2 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Dec 13, 2020Updated 5 years ago
- DEFCON 31 slide deck and video link☆68Jun 2, 2025Updated 11 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆57Dec 31, 2025Updated 4 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- I have created this dashboard to track oscp preparation. I have used several resources and has been mentioned in dashboard. Tjnull's blog…☆13Jul 8, 2022Updated 3 years ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆50Feb 29, 2024Updated 2 years ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆401Jul 23, 2025Updated 9 months ago
- This tool allows you to find ssti vulnerability with ease!☆22Sep 3, 2022Updated 3 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆185May 19, 2025Updated 11 months ago
- Simple C2 using GitHub repository as comms channel.☆32Oct 26, 2024Updated last year
- Brew Local Privilege Escalation exploit on Intel macOS☆19Mar 6, 2024Updated 2 years ago
- ☆91May 15, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- winPEAS, but for Active Directory☆173Apr 1, 2025Updated last year
- Retired TrustedSec Capabilities☆248Jan 5, 2026Updated 4 months ago
- A MBR Fuzzer☆31Apr 3, 2024Updated 2 years ago
- Some scripts to abuse kerberos using Powershell☆358Apr 10, 2026Updated 3 weeks ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆151Aug 26, 2024Updated last year
- A high-performance domain scanner that discovers active domains by testing multiple Top-Level Domains (TLDs) for given domain names.☆31Apr 20, 2026Updated 2 weeks ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆49Dec 18, 2024Updated last year