A simple multi-threaded distributed SSH brute-forcing tool written in Python
☆461Oct 30, 2022Updated 3 years ago
Alternatives and similar repositories for orbitaldump
Users that are interested in orbitaldump are comparing it to the libraries listed below
Sorting:
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- Bash script for CTF automating basic enumeration☆41Mar 1, 2022Updated 4 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆122Aug 1, 2022Updated 3 years ago
- For pentesters who don't wanna leave their terminals.☆183Aug 27, 2021Updated 4 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,156Updated this week
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆550Jul 16, 2021Updated 4 years ago
- A python script to dump files and folders remotely from a Windows SMB share.☆227Jan 31, 2025Updated last year
- fully automated pentesting tool☆518Dec 8, 2022Updated 3 years ago
- PowerShell Ransomware Simulator with C2 Server☆498Jan 2, 2026Updated 2 months ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- 🦁 Python project to identify and scan for vulnerabilities related to the Joomla CMS project. It scans for common misconfigurations and p…☆172May 2, 2024Updated last year
- ☆538Nov 20, 2021Updated 4 years ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,303Feb 27, 2026Updated last week
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆540Feb 7, 2024Updated 2 years ago
- SCodeScanner stands for Source Code scanner where the user can scans the source code for finding the Critical Vulnerabilities.☆162Jul 17, 2023Updated 2 years ago
- Jeeves SQLI Finder☆215May 13, 2022Updated 3 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆738May 19, 2023Updated 2 years ago
- Attack Surface Discovery tool built on a microservice approach, utilizing multi-threading for fast, internet-scale asset indexing☆255Dec 12, 2025Updated 2 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆672Oct 23, 2025Updated 4 months ago
- A web front-end for password cracking and analytics☆387Feb 17, 2026Updated 2 weeks ago
- An Office365 User Attack Tool☆646Mar 19, 2024Updated last year
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Jan 6, 2022Updated 4 years ago
- mip22 is a advanced phishing tool☆664Jul 31, 2024Updated last year
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Jan 10, 2025Updated last year
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆348Oct 22, 2024Updated last year
- ☆413Dec 14, 2023Updated 2 years ago
- An XSS exploitation command-line interface and payload generator.☆1,414Jan 19, 2025Updated last year
- Open source pre-operation C2 server based on python and powershell☆762Jul 6, 2021Updated 4 years ago
- PowerShell Asynchronous TCP Reverse Shell☆158Nov 27, 2025Updated 3 months ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Feb 15, 2024Updated 2 years ago
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆790Oct 29, 2022Updated 3 years ago
- Pentesting automation platform that combines hacking tools to complete assessments☆522Feb 26, 2026Updated last week
- JF⚡can - Super fast port scanning & service discovery using Masscan and Nmap. Scan large networks with Masscan and use Nmap's scripting a…☆666Feb 19, 2026Updated 2 weeks ago
- Generates millions of keyword-based password mutations in seconds.☆1,411Jun 8, 2025Updated 8 months ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆415Sep 8, 2025Updated 5 months ago
- Automated rogue access point setup tool.☆204Apr 2, 2021Updated 4 years ago
- Sandman is a NTP based backdoor for hardened networks.☆815Mar 31, 2024Updated last year
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆500Jan 23, 2023Updated 3 years ago