s0i37 / crawlLinks
Finding secrets in various (non-text) popular files.
☆51Updated 3 months ago
Alternatives and similar repositories for crawl
Users that are interested in crawl are comparing it to the libraries listed below
Sorting:
- Our Tips&Tricks☆128Updated 11 months ago
- Useful collection of scapy-scripts and more☆32Updated last year
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆25Updated 8 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆118Updated 7 months ago
- 1C RAS Offensive Security Tool☆28Updated 2 years ago
- Check bitrix vulnerabilities☆89Updated 2 years ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆62Updated last week
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆130Updated 9 months ago
- Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.☆63Updated 2 months ago
- About PIVOting☆13Updated 2 years ago
- exfiltration/infiltration toolkit☆49Updated last year
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆149Updated last year
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆117Updated 6 months ago
- Amazing whoami alternatives☆141Updated last year
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆77Updated this week
- ☆79Updated 8 months ago
- ☆164Updated 2 years ago
- ☆94Updated last year
- ☆163Updated 2 months ago
- Continuous password spraying tool☆198Updated last month
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆120Updated last year
- Enumerate Domain Users Without Authentication☆281Updated 9 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆134Updated last year
- ☆62Updated last month
- A Moodle Scanner☆43Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆263Updated 8 months ago
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆258Updated 2 months ago
- PoC that downloads an executable from a public SSL certificate☆135Updated 5 months ago
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago