grahamhelton / dredgeView external linksLinks
Dredging up secrets from the depths of the file system
☆132Nov 4, 2024Updated last year
Alternatives and similar repositories for dredge
Users that are interested in dredge are comparing it to the libraries listed below
Sorting:
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆35Jul 23, 2025Updated 6 months ago
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 2 months ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆110Oct 31, 2023Updated 2 years ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆52Aug 12, 2025Updated 6 months ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- ☆18Oct 28, 2025Updated 3 months ago
- ☆18Jun 25, 2024Updated last year
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated 2 weeks ago
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆17Dec 29, 2024Updated last year
- Nuke It From Orbit - remove AV/EDR with physical access☆271Dec 8, 2024Updated last year
- DEFCON 31 slide deck and video link☆66Jun 2, 2025Updated 8 months ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆55Dec 31, 2025Updated last month
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181May 19, 2025Updated 8 months ago
- Using PyRaider You can scan installed dependencies known security vulnerabilities. It uses publicly known exploits, vulnerabilities datab…☆17May 18, 2022Updated 3 years ago
- In-depth ldap enumeration utility☆555Feb 8, 2026Updated last week
- Some scripts to abuse kerberos using Powershell☆355Jul 27, 2023Updated 2 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- winPEAS, but for Active Directory☆171Apr 1, 2025Updated 10 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Jul 23, 2025Updated 6 months ago
- ☆16Sep 4, 2024Updated last year
- This tool automates the process of running FFUF (Fuzz Faster U Fool) and post-processing its results to extract valid URLs. It supports b…☆36Nov 5, 2024Updated last year
- ☆41Aug 25, 2024Updated last year
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆45Jul 6, 2025Updated 7 months ago
- command control framework☆29Feb 8, 2026Updated last week
- ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an int…☆51Updated this week
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆31Jan 27, 2025Updated last year
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,249Jul 22, 2025Updated 6 months ago
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated 11 months ago
- AWS Attack Path Management Tool - Walking on the Moon☆260Dec 5, 2024Updated last year
- Este script é uma ferramenta em Python projetada para automatizar a avaliação de segurança de APIs. Ele utiliza a especificação OpenAPI p…☆24Jan 28, 2025Updated last year
- SMB Audit Tool you were looking for☆24Jun 16, 2023Updated 2 years ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆75Sep 1, 2025Updated 5 months ago
- Analyse MSI files for vulnerabilities☆143Aug 30, 2024Updated last year
- Installs and adjusts Pentest tools.☆10Oct 19, 2022Updated 3 years ago
- Tool for bypassing logins vulnerable against SQL injection☆46Apr 3, 2024Updated last year
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- This tool allows you to find ssti vulnerability with ease!☆21Sep 3, 2022Updated 3 years ago