Python 3 script to dump/scrape/extract company employees from LinkedIn API
☆568Feb 12, 2026Updated 3 weeks ago
Alternatives and similar repositories for LinkedInDumper
Users that are interested in LinkedInDumper are comparing it to the libraries listed below
Sorting:
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping☆1,477Nov 26, 2024Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆52Jul 15, 2023Updated 2 years ago
- Escalate Service Account To LocalSystem via Kerberos☆403Sep 14, 2023Updated 2 years ago
- An OSINT tool that helps detect members of a company with leaked credentials☆768Feb 18, 2025Updated last year
- Send phishing messages and attachments to Microsoft Teams users☆1,106Jun 19, 2024Updated last year
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆738May 19, 2023Updated 2 years ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆275May 10, 2024Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆180Feb 14, 2023Updated 3 years ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆721Aug 18, 2023Updated 2 years ago
- Set of python scripts which perform different ways of command execution via WMI protocol.☆165Jun 29, 2023Updated 2 years ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆569Jan 20, 2026Updated last month
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆892Feb 18, 2026Updated 2 weeks ago
- Some scripts to abuse kerberos using Powershell☆355Jul 27, 2023Updated 2 years ago
- DPAPI looting remotely and locally in Python☆542Oct 7, 2025Updated 4 months ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Jan 10, 2025Updated last year
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated 11 months ago
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆326Jan 31, 2023Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azure☆218Jan 18, 2023Updated 3 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,156Updated this week
- evilginx3 + gophish☆1,962Jun 15, 2024Updated last year
- Real fucking shellcode encryptor & obfuscator tool☆1,011Jan 7, 2026Updated last month
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,263Mar 19, 2025Updated 11 months ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Jun 25, 2024Updated last year
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,100Jun 10, 2024Updated last year
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- Extract C2 Traffic☆253Nov 25, 2024Updated last year
- ☆568Mar 28, 2024Updated last year
- ☆65May 26, 2023Updated 2 years ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆673Feb 17, 2026Updated 2 weeks ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆445Aug 18, 2023Updated 2 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆348Oct 22, 2024Updated last year
- Your template-based BloodHound terminal companion tool☆447Jan 21, 2026Updated last month
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,370Oct 27, 2023Updated 2 years ago
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,475Jan 23, 2026Updated last month
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆254Mar 7, 2022Updated 3 years ago
- PowerShell Ransomware Simulator with C2 Server☆499Jan 2, 2026Updated 2 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆361Dec 13, 2025Updated 2 months ago
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,305Jan 29, 2026Updated last month