jackmichalak / phishim
Easy red team phishing with Puppeteer
☆127Updated last year
Related projects: ⓘ
- C2 Automation using Linode☆78Updated last year
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆134Updated last year
- ☆139Updated 6 months ago
- linikatz is a tool to attack AD on UNIX☆134Updated 11 months ago
- ☆95Updated 2 years ago
- ☆90Updated last week
- Generate graphs and charts based on password cracking result☆152Updated last year
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆164Updated last year
- Automated exploitation of MSSQL servers at scale☆79Updated this week
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆89Updated 3 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆66Updated last year
- ☆110Updated last year
- ☆117Updated last year
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆175Updated last month
- Everything and anything related to password spraying☆122Updated 3 months ago
- ☆57Updated this week
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆57Updated 9 months ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆129Updated 10 months ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆95Updated last year
- Cortex XDR Config Extractor☆119Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆80Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆86Updated last month
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆119Updated last month
- Network penetration testing toolset wrapper☆82Updated 2 years ago
- ☆46Updated 2 years ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆63Updated 3 months ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆84Updated last year
- Some scripts to support with importing large datasets into BloodHound☆75Updated 9 months ago
- PowerShell Reverse Shell☆60Updated last year