needmorecowbell / HamburglarView external linksLinks
Hamburglar -- collect useful information from urls, directories, and files
☆320Jan 3, 2026Updated last month
Alternatives and similar repositories for Hamburglar
Users that are interested in Hamburglar are comparing it to the libraries listed below
Sorting:
- Discover target social media profiles☆81Sep 26, 2022Updated 3 years ago
- Wraps github api for openly available information about an organization, user, or repo☆128May 22, 2023Updated 2 years ago
- Pastebin OSINT Harvester☆329Apr 27, 2019Updated 6 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Powershell script to exfiltrate large files quickly and securely☆125May 4, 2022Updated 3 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- Abusing Exchange via EWS☆152Sep 14, 2020Updated 5 years ago
- Pypykatz server☆125Mar 15, 2019Updated 6 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 2 years ago
- an asynchronous target enumeration tool☆245Dec 8, 2022Updated 3 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- Linux Local Privesc Helper and Agent☆166Dec 2, 2019Updated 6 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 4 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆401May 20, 2020Updated 5 years ago
- Parse NTLM challenge messages over HTTP and SMB☆150Nov 10, 2022Updated 3 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆470Nov 14, 2019Updated 6 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆823Nov 15, 2025Updated 3 months ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆424Jan 16, 2026Updated last month
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,415Oct 3, 2020Updated 5 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,132Dec 7, 2022Updated 3 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Identify technologies used on websites.☆295Jan 14, 2024Updated 2 years ago
- gather gather gather☆584Mar 15, 2025Updated 11 months ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆781Jun 20, 2020Updated 5 years ago
- Modern tactical exploitation toolkit.☆857Nov 8, 2025Updated 3 months ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆633Jun 20, 2017Updated 8 years ago
- Extracting URLs of a specific target based on the results of "commoncrawl.org"☆275Dec 4, 2025Updated 2 months ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆655Jan 6, 2022Updated 4 years ago
- lateral movement techniques that can be used during red team exercises☆273Jan 13, 2020Updated 6 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆620Oct 6, 2025Updated 4 months ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Jun 10, 2023Updated 2 years ago
- OSINT scanning tool which discovers and maps directories found in javascript files hosted on a website.☆229Feb 24, 2019Updated 6 years ago
- SMB Relay Attack Script☆146Dec 6, 2018Updated 7 years ago
- Extract subdomains from SSL certificates in HTTPS sites.☆388Mar 3, 2025Updated 11 months ago