optiv / KnockKnock
Enumerate valid users within Microsoft Teams and OneDrive with clean output.
☆58Updated 2 months ago
Alternatives and similar repositories for KnockKnock:
Users that are interested in KnockKnock are comparing it to the libraries listed below
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- PowerShell Reverse Shell☆61Updated last year
- ☆156Updated last year
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆88Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆75Updated 5 months ago
- ☆52Updated last year
- Enumerate domain machine accounts and perform pre2k password spraying.☆69Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆80Updated 7 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆56Updated 4 months ago
- ☆44Updated 9 months ago
- ☆79Updated 8 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 7 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆113Updated 3 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆171Updated 2 years ago
- ☆83Updated 3 months ago
- Lateral Movement☆122Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 10 months ago
- ☆51Updated last year
- Source code and examples for PassiveAggression☆54Updated 10 months ago
- ☆55Updated 5 months ago
- Automated exploitation of MSSQL servers at scale☆108Updated 2 weeks ago
- ☆27Updated last year
- ☆117Updated 3 weeks ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆92Updated 2 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- C2 Automation using Linode☆80Updated 2 years ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆69Updated 6 months ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆40Updated last year