Python 3 script to dump/scrape/extract company employees from LinkedIn API
☆580Feb 12, 2026Updated 2 months ago
Alternatives and similar repositories for LinkedInDumper
Users that are interested in LinkedInDumper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An OSINT tool that helps detect members of a company with leaked credentials☆772Feb 18, 2025Updated last year
- LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping☆1,493Nov 26, 2024Updated last year
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆484Oct 14, 2022Updated 3 years ago
- Escalate Service Account To LocalSystem via Kerberos☆403Sep 14, 2023Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆180Feb 14, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Some scripts to abuse kerberos using Powershell☆356Jul 27, 2023Updated 2 years ago
- Send phishing messages and attachments to Microsoft Teams users☆1,113Jun 19, 2024Updated last year
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆742May 19, 2023Updated 2 years ago
- ☆65May 26, 2023Updated 2 years ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆590Jan 20, 2026Updated 2 months ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆721Aug 18, 2023Updated 2 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Jan 10, 2025Updated last year
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆277May 10, 2024Updated last year
- Python 3 script to dump/scrape/extract company employees from XING API☆38Feb 12, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆906Updated this week
- Real fucking shellcode encryptor & obfuscator tool☆1,018Jan 7, 2026Updated 3 months ago
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆327Jan 31, 2023Updated 3 years ago
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated last year
- Collection of offensive tools targeting Microsoft Azure☆220Apr 1, 2026Updated last week
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆53Jul 15, 2023Updated 2 years ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,265Mar 19, 2025Updated last year
- Set of python scripts which perform different ways of command execution via WMI protocol.☆165Jun 29, 2023Updated 2 years ago
- A command-line utility for performing reverse DNS lookups☆72Aug 10, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- DPAPI looting remotely and locally in Python☆546Mar 13, 2026Updated last month
- ☆16Apr 21, 2023Updated 2 years ago
- A C# Command & Control framework☆1,030Mar 28, 2024Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,161Mar 8, 2026Updated last month
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆364Dec 13, 2025Updated 4 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆685Oct 23, 2025Updated 5 months ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆677Feb 17, 2026Updated last month
- This map lists the essential techniques to bypass anti-virus and EDR☆3,183Mar 28, 2025Updated last year
- Poastal - the Email OSINT tool☆598Apr 8, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Tool to remotely dump secrets from the Windows registry☆526Feb 27, 2026Updated last month
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,129Jun 10, 2024Updated last year
- Your template-based BloodHound terminal companion tool☆447Jan 21, 2026Updated 2 months ago
- evilginx3 + gophish☆1,977Jun 15, 2024Updated last year
- Dump NTDS with golden certificates and UnPAC the hash☆646Mar 20, 2024Updated 2 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆395Feb 23, 2024Updated 2 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆485Jul 9, 2024Updated last year