shellfarmer / WeakestLink
Browser extension that extracts users from LinkedIn company pages
☆157Updated last year
Alternatives and similar repositories for WeakestLink:
Users that are interested in WeakestLink are comparing it to the libraries listed below
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆194Updated last month
- Network penetration testing toolset wrapper☆81Updated 2 years ago
- ☆96Updated 2 years ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- ☆186Updated last year
- Modular Enumeration and Password Spraying Framework☆116Updated 11 months ago
- MayorSec DNS Enumeration Tool☆84Updated 3 months ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆228Updated last year
- ☆65Updated 2 years ago
- Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance.☆192Updated 4 months ago
- Password spraying tool and Bloodhound integration☆226Updated 2 months ago
- msImpersonate - User account impersonation written in pure Python3☆107Updated 2 years ago
- Powershell script to extract information from boot PXE☆139Updated 5 years ago
- ☆34Updated 3 years ago
- Password list generator for password spraying - prebaked with goodies☆103Updated 2 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆141Updated last year
- Custom Queries - Brought Up to BH4.1 syntax☆244Updated 4 months ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆389Updated 2 months ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆42Updated 8 months ago
- Generate graphs and charts based on password cracking result☆160Updated 2 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆151Updated 2 years ago
- Inject remote template link into word document for remote template injection☆166Updated 4 years ago
- ☆53Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆84Updated 2 years ago
- PEN-300/OSEP Public resources for PEN-300 Training☆89Updated 3 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆218Updated 2 years ago
- Hiding GoPhish from the boys in blue☆177Updated 2 years ago
- ☆133Updated 8 months ago
- ☆189Updated 5 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆95Updated last year