Python 3 script to dump/scrape/extract company employees from LinkedIn API
☆584Apr 18, 2026Updated 2 weeks ago
Alternatives and similar repositories for LinkedInDumper
Users that are interested in LinkedInDumper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An OSINT tool that helps detect members of a company with leaked credentials☆771Feb 18, 2025Updated last year
- LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping☆1,512Nov 26, 2024Updated last year
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆485Oct 14, 2022Updated 3 years ago
- Escalate Service Account To LocalSystem via Kerberos☆404Sep 14, 2023Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆180Feb 14, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Send phishing messages and attachments to Microsoft Teams users☆1,114Jun 19, 2024Updated last year
- Some scripts to abuse kerberos using Powershell☆358Apr 10, 2026Updated 3 weeks ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆743May 19, 2023Updated 2 years ago
- ☆65May 26, 2023Updated 2 years ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆594Jan 20, 2026Updated 3 months ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆721Aug 18, 2023Updated 2 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Jan 10, 2025Updated last year
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆277May 10, 2024Updated last year
- Python 3 script to dump/scrape/extract company employees from XING API☆38Apr 18, 2026Updated 2 weeks ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆912Apr 24, 2026Updated last week
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆327Jan 31, 2023Updated 3 years ago
- Real fucking shellcode encryptor & obfuscator tool☆1,024Jan 7, 2026Updated 3 months ago
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated last year
- Collection of offensive tools targeting Microsoft Azure☆222Apr 1, 2026Updated last month
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆54Jul 15, 2023Updated 2 years ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,268Mar 19, 2025Updated last year
- Set of python scripts which perform different ways of command execution via WMI protocol.☆165Jun 29, 2023Updated 2 years ago
- A command-line utility for performing reverse DNS lookups☆72Aug 10, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- DPAPI looting remotely and locally in Python☆549Mar 13, 2026Updated last month
- ☆16Apr 21, 2023Updated 3 years ago
- A C# Command & Control framework☆1,032Mar 28, 2024Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,175Updated this week
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆689Oct 23, 2025Updated 6 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆364Dec 13, 2025Updated 4 months ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆679Feb 17, 2026Updated 2 months ago
- Poastal - the Email OSINT tool☆598Apr 8, 2024Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,253Mar 28, 2025Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Tool to remotely dump secrets from the Windows registry☆527Feb 27, 2026Updated 2 months ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,145Jun 10, 2024Updated last year
- Your template-based BloodHound terminal companion tool☆449Jan 21, 2026Updated 3 months ago
- evilginx3 + gophish☆1,988Jun 15, 2024Updated last year
- Dump NTDS with golden certificates and UnPAC the hash☆648Mar 20, 2024Updated 2 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆396Feb 23, 2024Updated 2 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆486Jul 9, 2024Updated last year