n0pe-sled / Postfix-Server-Setup
☆230Updated 3 years ago
Alternatives and similar repositories for Postfix-Server-Setup:
Users that are interested in Postfix-Server-Setup are comparing it to the libraries listed below
- DomainCheck is designed to assist operators with monitoring changes related to their domain names. This includes negative changes in cate…☆232Updated 4 months ago
- locate and attack Lync/Skype for Business☆336Updated 6 months ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆448Updated 2 years ago
- Domain user enumeration tool☆215Updated last year
- ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.☆228Updated 7 years ago
- A framework for stealthy domain reconnaissance☆302Updated 3 years ago
- Search for categorized domain☆444Updated 6 years ago
- ☆272Updated 2 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆246Updated 9 months ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆303Updated 2 years ago
- A script to test an RDP host for sticky keys and utilman backdoor.☆258Updated 8 years ago
- Fileless web browser information extraction☆218Updated 6 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆394Updated 4 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆161Updated 5 years ago
- ☆167Updated 7 years ago
- Fake User Generator for Active Directory Environments☆158Updated 6 years ago
- Rapid Attack Infrastructure (RAI)☆303Updated 4 months ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆305Updated 4 years ago
- ☆518Updated 2 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆249Updated 4 years ago
- PowerDNS: Powershell DNS Delivery☆211Updated 6 years ago
- For all your network pentesting needs☆152Updated 9 months ago
- Search for potential frontable domains☆622Updated 2 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆386Updated 6 years ago
- Phishing Template Generation Made Easy☆165Updated 7 years ago
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆376Updated 5 years ago
- Aggressor scripts I've made for Cobalt Strike☆407Updated last year
- An LDAP based Active Directory user and group enumeration tool☆308Updated 2 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆182Updated 5 years ago
- Weaponizing Splunk with reverse and bind shells.☆176Updated 7 years ago