A tool for collecting RDP, web and VNC screenshots all in one place
☆480Apr 3, 2023Updated 3 years ago
Alternatives and similar repositories for scrying
Users that are interested in scrying are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Standalone utility for service discovery on open ports!☆755Jan 13, 2026Updated 4 months ago
- .NET Project for Attacking vCenter☆559Nov 11, 2021Updated 4 years ago
- Reuse open handles to dynamically dump LSASS.☆247Apr 4, 2024Updated 2 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆190Jan 30, 2023Updated 3 years ago
- Various Cobalt Strike BOFs☆762Oct 16, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆222Aug 23, 2022Updated 3 years ago
- NTLM relaying for Windows made easy☆582Apr 25, 2023Updated 3 years ago
- Cobalt Strike Beacon Object Files (BOFs) written in rust with rust core and alloc.☆283Feb 8, 2024Updated 2 years ago
- Tool for interacting with outlook interop during red team engagements☆147Jun 29, 2021Updated 4 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,281Apr 23, 2026Updated 3 weeks ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆763Sep 23, 2024Updated last year
- Maximizing BloodHound. Max is a good boy.☆534Apr 25, 2025Updated last year
- Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop☆1,277Nov 2, 2022Updated 3 years ago
- Cobalt Strike kit for Lateral Movement☆678Feb 21, 2020Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,823Feb 27, 2026Updated 2 months ago
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,103Apr 19, 2023Updated 3 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,663Aug 28, 2025Updated 8 months ago
- Windows Privilege Escalation from User to Domain Admin.☆1,456Dec 18, 2022Updated 3 years ago
- A C2 post-exploitation framework☆488Jan 24, 2024Updated 2 years ago
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆490Sep 24, 2025Updated 7 months ago
- A VSCode plugin to assist with BOF development.☆37Aug 14, 2024Updated last year
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆220Jul 14, 2021Updated 4 years ago
- ☆671Nov 17, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Coerce Windows machines auth via MS-EVEN☆175Jan 17, 2024Updated 2 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆532Nov 19, 2024Updated last year
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,446Jul 20, 2024Updated last year
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆189Jun 22, 2022Updated 3 years ago
- Extract credentials from lsass remotely☆2,202Mar 23, 2026Updated last month
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,083Apr 29, 2026Updated 3 weeks ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆248Mar 19, 2024Updated 2 years ago
- UAC bypass by abusing RPC and debug objects.☆630Oct 19, 2023Updated 2 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆609Aug 5, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- LSASS memory dumper using direct system calls and API unhooking.☆1,585Jan 5, 2021Updated 5 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,639Jul 10, 2023Updated 2 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆287Oct 29, 2024Updated last year
- Reflective DLL loading of your favorite Golang program☆174Jan 27, 2020Updated 6 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆378Oct 30, 2020Updated 5 years ago
- A tool to make socks connections through HTTP agents☆721Mar 30, 2021Updated 5 years ago
- Self-developed tools for Lateral Movement/Code Execution☆722Aug 17, 2021Updated 4 years ago