nccgroup / scrying
A tool for collecting RDP, web and VNC screenshots all in one place
β459Updated last year
Alternatives and similar repositories for scrying:
Users that are interested in scrying are comparing it to the libraries listed below
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedinβ432Updated 11 months ago
- Enumerate information from NTLM authentication enabled web endpoints πβ468Updated 7 months ago
- LDAP library for auditing MS ADβ397Updated last week
- NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The β¦β325Updated last year
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.β436Updated last year
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via sockeβ¦β736Updated 3 years ago
- project-blacklist3rβ520Updated 2 years ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queriesβ359Updated 3 years ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Goβ278Updated 2 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders aβ¦β335Updated 6 years ago
- IOXIDResolver.py from AirBus Securityβ227Updated last year
- Password spraying and bruteforcing tool for Active Directory Domain Servicesβ358Updated 3 months ago
- scan for NTLM directoriesβ351Updated 7 months ago
- An Office365 User Attack Toolβ630Updated 10 months ago
- Office 365 and Exchange Enumerationβ184Updated 5 years ago
- Combined port scanning w/ Masscan's speed & Nmap's scanning features.β147Updated 2 years ago
- Automatically spawn a reverse shell fully interactive for Linux or Windows victimβ355Updated last year
- Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but stillβ¦β410Updated 3 months ago
- Active Directory Integrated DNS dumping by any authenticated userβ959Updated 2 months ago
- Fast directory scanning and scraping toolβ620Updated 10 months ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses withβ¦β295Updated last year
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkitβ429Updated last year
- A tool to make socks connections through HTTP agentsβ684Updated 3 years ago
- Kerberoast with ACL abuse capabilitiesβ391Updated last month
- Tools for Kerberos PKINIT and relaying to AD CSβ678Updated 3 weeks ago
- A super small jsp webshell with file upload capabilities.β291Updated 3 years ago
- DNSProb is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplieβ¦β277Updated 4 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Muβ¦β218Updated 3 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacketβ517Updated 2 years ago
- Scan Victim Backup Directories & Backup Filesβ178Updated last year