s0i37 / crawlLinks
Finding secrets in various (non-text) popular files.
☆49Updated 3 months ago
Alternatives and similar repositories for crawl
Users that are interested in crawl are comparing it to the libraries listed below
Sorting:
- Useful collection of scapy-scripts and more☆31Updated last year
- 1C RAS Offensive Security Tool☆27Updated 2 years ago
- Our Tips&Tricks☆126Updated 7 months ago
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆25Updated 5 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆116Updated 3 months ago
- exfiltration/infiltration toolkit☆48Updated 11 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆112Updated 2 months ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆53Updated last month
- Amazing whoami alternatives☆141Updated last year
- ☆100Updated last year
- About PIVOting☆12Updated last year
- Check bitrix vulnerabilities☆85Updated last year
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆122Updated 6 months ago
- Cisco IOS Security Inspector☆37Updated last month
- Continuous password spraying tool☆193Updated last week
- ☆92Updated 5 years ago
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆241Updated 8 months ago
- ☆76Updated 5 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆245Updated 5 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆198Updated 7 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆115Updated 8 months ago
- ☆335Updated last month
- Chrome browser extension-based Command & Control☆174Updated 3 months ago
- Creating a Malicious Macro using MS Word☆24Updated 3 years ago
- Inject RDPThief into memory with PowerShell.☆65Updated 8 months ago
- LSTAR - CobaltStrike Translated to EN☆22Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆149Updated last year
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆146Updated last year
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆140Updated 8 months ago
- Detect common NFS server misconfigurations☆67Updated 4 months ago