LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping
☆1,531Nov 26, 2024Updated last year
Alternatives and similar repositories for CrossLinked
Users that are interested in CrossLinked are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OSINT Tool: Generate username lists for companies on LinkedIn☆1,690Jan 15, 2024Updated 2 years ago
- LinkedIn Recon Tool☆1,200Mar 6, 2023Updated 3 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,388Mar 9, 2026Updated 2 months ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,276Mar 19, 2025Updated last year
- Username enumeration and password spraying tool aimed at Microsoft O365.☆1,004Nov 6, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,336Apr 1, 2026Updated last month
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆2,076Jul 12, 2025Updated 10 months ago
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆1,085Mar 19, 2024Updated 2 years ago
- Utility to download and extract document metadata from an organization. This technique can be used to identify: domains, usernames, softw…☆515Jun 19, 2024Updated last year
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆754Jul 29, 2025Updated 9 months ago
- Scrape, Hunt, and Transform names and usernames☆128Nov 19, 2022Updated 3 years ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,345Apr 24, 2026Updated 3 weeks ago
- ☆420Apr 28, 2021Updated 5 years ago
- Maximizing BloodHound. Max is a good boy.☆534Apr 25, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆490Sep 24, 2025Updated 7 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,881Aug 18, 2023Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,176May 14, 2026Updated last week
- A tool for checking if MFA is enabled on multiple Microsoft Services☆1,669Apr 13, 2026Updated last month
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,281Apr 23, 2026Updated 3 weeks ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,823Feb 27, 2026Updated 2 months ago
- Extract credentials from lsass remotely☆2,202Mar 23, 2026Updated last month
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,568Oct 17, 2022Updated 3 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,146Jun 10, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆487Oct 14, 2022Updated 3 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆536Aug 1, 2022Updated 3 years ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,148Oct 21, 2024Updated last year
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,252Apr 24, 2026Updated 3 weeks ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆422Mar 21, 2025Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,389Oct 27, 2023Updated 2 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆451Nov 2, 2023Updated 2 years ago
- A tool to scrape LinkedIn without API restrictions for data reconnaissance☆1,219Apr 11, 2024Updated 2 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆532Nov 19, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,602Feb 5, 2026Updated 3 months ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 4 years ago
- Dumping DPAPI credz remotely☆1,368Mar 24, 2025Updated last year
- An Office365 User Attack Tool☆652Mar 19, 2024Updated 2 years ago
- A standalone DLL that exports databases in cleartext once injected in the KeePass process.☆301Mar 1, 2023Updated 3 years ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,983Aug 15, 2023Updated 2 years ago
- ☆1,690Apr 14, 2025Updated last year