pownjs / whoaretheyView external linksLinks
Discover target social media profiles
☆81Sep 26, 2022Updated 3 years ago
Alternatives and similar repositories for whoarethey
Users that are interested in whoarethey are comparing it to the libraries listed below
Sorting:
- Powershell script to exfiltrate large files quickly and securely☆125May 4, 2022Updated 3 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Dec 4, 2020Updated 5 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- generates weak passwords based on current date☆43Jun 27, 2024Updated last year
- ☆34Jul 23, 2018Updated 7 years ago
- Hamburglar -- collect useful information from urls, directories, and files☆319Jan 3, 2026Updated last month
- UAC Bypass with mmc via alpc☆158Apr 5, 2019Updated 6 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- ☆69Dec 19, 2018Updated 7 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- Funnel is a lightweight yara-based feed scraper☆38May 22, 2023Updated 2 years ago
- Samba, NFS shares spider and grepper☆71Jul 11, 2018Updated 7 years ago
- Pown.js is a security testing an exploitation toolkit built on top of Node.js and NPM.☆262Apr 7, 2023Updated 2 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Jun 14, 2021Updated 4 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 3 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 2 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Jul 5, 2022Updated 3 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Apr 19, 2019Updated 6 years ago
- A powerful target reconnaissance framework powered by graph theory.☆418Oct 21, 2022Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 4 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- A simple email generator that uses dorks on Bing to generate emails from LinkedIn Profiles.☆151Oct 19, 2022Updated 3 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆218Mar 5, 2020Updated 5 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆823Nov 15, 2025Updated 3 months ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Feb 21, 2020Updated 5 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆260Apr 6, 2021Updated 4 years ago
- LinkedIn reconnaissance tool☆55Dec 17, 2021Updated 4 years ago
- In motherland, target network calls you!☆61Sep 4, 2018Updated 7 years ago
- ☆92Dec 8, 2022Updated 3 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Computer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity)☆197Feb 1, 2021Updated 5 years ago
- Targeted Payload Execution☆100Apr 9, 2020Updated 5 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago