Finding secrets in various (non-text) popular files.
☆52Oct 21, 2025Updated 4 months ago
Alternatives and similar repositories for crawl
Users that are interested in crawl are comparing it to the libraries listed below
Sorting:
- It's my solution for bugbounty automation☆22Feb 24, 2026Updated last week
- ☆16Jun 15, 2025Updated 8 months ago
- Collection of antivirus bypass techniques☆13Nov 20, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated 11 months ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆42Jan 14, 2026Updated last month
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- An AD CS toolkit for AD Admins, Defensive Security Professionals, and Filthy Red Teamers☆29Feb 21, 2026Updated 2 weeks ago
- ☆18Jul 3, 2020Updated 5 years ago
- Brute Ratel External C2 (Microsoft Teams)☆38Dec 11, 2024Updated last year
- Chase subdomains by parsing the results of Google and Yandex search results☆15Sep 29, 2023Updated 2 years ago
- Public OCI-Image (docker image) Security Checker☆20Feb 16, 2026Updated 2 weeks ago
- ☆46Sep 24, 2025Updated 5 months ago
- 1C Exploit Kit☆78Dec 8, 2021Updated 4 years ago
- Living Off the Foreign Land setup scripts☆74Feb 26, 2025Updated last year
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Dec 6, 2019Updated 6 years ago
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆26May 6, 2025Updated 10 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 3 years ago
- USB Monitor is a simple C# program that uses WMI to track information about newly connected and disconnected USB devices☆23Dec 16, 2023Updated 2 years ago
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆26Oct 1, 2023Updated 2 years ago
- A C# tool to send emails through Outlook from the command line or in memory☆32Jun 17, 2020Updated 5 years ago
- karma WiFi attack implementation☆56Oct 23, 2024Updated last year
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Nov 23, 2022Updated 3 years ago
- Tool to obtain hash using MS-SNTP for user accounts☆29Jan 22, 2025Updated last year
- Framework for blind boolean-based sql injections exploatation. Use it if sqlmap does shit.☆29Mar 26, 2022Updated 3 years ago
- lnk_parser is a full rust implementation to parse windows LNK files☆23Feb 17, 2026Updated 2 weeks ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- ☆109Feb 17, 2025Updated last year
- Extracting NetNTLM without touching lsass.exe☆244Nov 27, 2023Updated 2 years ago
- NTFS parsing library in C#. Allows one to parse and read NTFS structures on disk.☆32Jul 16, 2021Updated 4 years ago
- 1C RAS Offensive Security Tool☆28Oct 4, 2023Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Using LNK files and user input simulation to start processes under explorer.exe☆34Sep 21, 2024Updated last year
- My implementation of the GIUDA project in C++☆189Jul 25, 2023Updated 2 years ago
- ☆65Mar 15, 2024Updated last year
- reverse socks tunneler with ntlm and proxy support☆28Nov 24, 2019Updated 6 years ago
- ☆80Jan 26, 2025Updated last year