optiv / KnockKnockLinks
Enumerate valid users within Microsoft Teams and OneDrive with clean output.
☆59Updated 10 months ago
Alternatives and similar repositories for KnockKnock
Users that are interested in KnockKnock are comparing it to the libraries listed below
Sorting:
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 2 years ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆79Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- ☆44Updated last year
- Discord C2 Profile for Mythic☆33Updated 10 months ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- ☆53Updated 2 years ago
- ☆29Updated 2 years ago
- Duplicate not owned Token from Running Process☆74Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated last year
- ☆52Updated last year
- PowerShell Reverse Shell☆79Updated 2 years ago
- Easy red team phishing with Puppeteer☆134Updated 2 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆100Updated 2 years ago
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated 2 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Updated last year
- ☆59Updated last year
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- ☆163Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Updated 5 months ago
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆82Updated last week
- Automated exploitation of MSSQL servers at scale☆128Updated last month
- ☆109Updated last year
- ☆85Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆81Updated last year
- Scripts that automate portions of pentests.☆56Updated last week
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆76Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 9 months ago