A tool for collecting RDP, web and VNC screenshots all in one place
☆482Apr 3, 2023Updated 2 years ago
Alternatives and similar repositories for scrying
Users that are interested in scrying are comparing it to the libraries listed below
Sorting:
- Standalone utility for service discovery on open ports!☆718Jan 13, 2026Updated last month
- .NET Project for Attacking vCenter☆553Nov 11, 2021Updated 4 years ago
- Maximizing BloodHound. Max is a good boy.☆531Apr 25, 2025Updated 10 months ago
- Reuse open handles to dynamically dump LSASS.☆246Apr 4, 2024Updated last year
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,263Dec 9, 2025Updated 2 months ago
- Cobalt Strike Beacon Object Files (BOFs) written in rust with rust core and alloc.☆282Feb 8, 2024Updated 2 years ago
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 2 years ago
- Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop☆1,237Nov 2, 2022Updated 3 years ago
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆220Aug 23, 2022Updated 3 years ago
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆484Sep 24, 2025Updated 5 months ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,644Aug 28, 2025Updated 6 months ago
- Windows Privilege Escalation from User to Domain Admin.☆1,439Dec 18, 2022Updated 3 years ago
- A C2 post-exploitation framework☆482Jan 24, 2024Updated 2 years ago
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,097Apr 19, 2023Updated 2 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆219Jul 14, 2021Updated 4 years ago
- Various Cobalt Strike BOFs☆743Oct 16, 2022Updated 3 years ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆246Mar 19, 2024Updated last year
- A tool to make socks connections through HTTP agents☆719Mar 30, 2021Updated 4 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆761Sep 23, 2024Updated last year
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,737Feb 2, 2026Updated last month
- LDAP library for auditing MS AD☆486Feb 11, 2026Updated 2 weeks ago
- UAC bypass by abusing RPC and debug objects.☆627Oct 19, 2023Updated 2 years ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,053Jan 22, 2026Updated last month
- ☆667Nov 17, 2021Updated 4 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,426Jul 20, 2024Updated last year
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,606Jul 10, 2023Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,874Aug 18, 2023Updated 2 years ago
- Extract credentials from lsass remotely☆2,178Dec 24, 2025Updated 2 months ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆284Oct 29, 2024Updated last year
- Cobalt Strike kit for Lateral Movement☆678Feb 21, 2020Updated 6 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆768Feb 16, 2021Updated 5 years ago
- Self-developed tools for Lateral Movement/Code Execution☆718Aug 17, 2021Updated 4 years ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆145Sep 4, 2021Updated 4 years ago
- Coerce Windows machines auth via MS-EVEN☆172Jan 17, 2024Updated 2 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆372Oct 30, 2020Updated 5 years ago
- Reflective DLL loading of your favorite Golang program☆173Jan 27, 2020Updated 6 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago