Enumerate valid users within Microsoft Teams and OneDrive with clean output.
☆61Feb 4, 2025Updated last year
Alternatives and similar repositories for KnockKnock
Users that are interested in KnockKnock are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An OSINT employee/username enumeration tool☆67Dec 15, 2025Updated 4 months ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆86Jan 6, 2023Updated 3 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Modular framework to exploit UPS devices☆65Mar 1, 2023Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆97Mar 8, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Top hashpwn rules☆20Dec 12, 2025Updated 4 months ago
- Web Path Finder☆60Nov 22, 2023Updated 2 years ago
- ☆113Oct 10, 2022Updated 3 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆209Jan 12, 2025Updated last year
- ☆24Apr 28, 2024Updated 2 years ago
- Tool to remotely dump secrets from the Windows registry☆527Feb 27, 2026Updated 2 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspective☆173Jan 12, 2026Updated 3 months ago
- tool for identifying guest relationships between companies☆103Jun 27, 2024Updated last year
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆23Oct 6, 2021Updated 4 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆375Mar 24, 2026Updated last month
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- Beacon Object Files (not Buffer Overflows)☆58Mar 6, 2023Updated 3 years ago
- Beacon Object Files for roasting Active Directory☆238Feb 21, 2022Updated 4 years ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆130Nov 12, 2023Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆60Apr 16, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆295Jul 15, 2023Updated 2 years ago
- ☆132Jan 25, 2023Updated 3 years ago
- ☆224Oct 22, 2023Updated 2 years ago
- ShootCutMe an .LNK file creator tool for redteamer☆16Oct 2, 2024Updated last year
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆490Sep 24, 2025Updated 7 months ago
- ☆22Jun 21, 2022Updated 3 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆130Dec 23, 2025Updated 4 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Collection of CobaltStrike beacon object files☆105Feb 14, 2022Updated 4 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133May 6, 2022Updated 4 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Jul 25, 2023Updated 2 years ago
- Syscall BOF to arbitrarily add/detract process token privilege rights.☆67Jul 10, 2024Updated last year
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆226Jul 25, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL…☆184Mar 13, 2023Updated 3 years ago
- ☆48Feb 11, 2023Updated 3 years ago