nccgroup / scrying
A tool for collecting RDP, web and VNC screenshots all in one place
☆451Updated last year
Related projects ⓘ
Alternatives and complementary repositories for scrying
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆431Updated last year
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆424Updated 9 months ago
- scan for NTLM directories☆346Updated 4 months ago
- Standalone utility for service discovery on open ports!☆567Updated 3 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆465Updated 4 months ago
- project-blacklist3r☆496Updated 2 years ago
- Office 365 and Exchange Enumeration☆181Updated 5 years ago
- Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still…☆403Updated 2 weeks ago
- Combined port scanning w/ Masscan's speed & Nmap's scanning features.☆148Updated 2 years ago
- An Office365 User Attack Tool☆621Updated 7 months ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆329Updated 5 years ago
- Retrieve LAPS password from LDAP☆383Updated 3 years ago
- A tool to make socks connections through HTTP agents☆684Updated 3 years ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆277Updated last year
- NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The …☆316Updated last year
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆348Updated 3 years ago
- IOXIDResolver.py from AirBus Security☆218Updated last year
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆424Updated last year
- Automatically spawn a reverse shell fully interactive for Linux or Windows victim☆352Updated last year
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆492Updated 2 years ago
- An script to perform kerberos bruteforcing by using impacket☆434Updated 2 years ago
- An automated target reconnaissance pipeline.☆428Updated last year
- Active Directory ACL exploitation with BloodHound☆701Updated 2 years ago
- A super small jsp webshell with file upload capabilities.☆290Updated 3 years ago
- LDAP library for auditing MS AD☆365Updated 2 months ago
- Kerberoast attack -pure python-☆419Updated 11 months ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆174Updated 2 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…