gather gather gather
☆587Mar 15, 2025Updated last year
Alternatives and similar repositories for jackdaw
Users that are interested in jackdaw are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LDAP library for auditing MS AD☆495Feb 11, 2026Updated 3 months ago
- Kerberoast attack -pure python-☆434Nov 30, 2023Updated 2 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆763Sep 23, 2024Updated last year
- Active Directory Assessment and Privilege Escalation Script☆1,128Dec 7, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆508Sep 23, 2025Updated 7 months ago
- Find vulnerabilities in AD Group Policy☆642Mar 25, 2022Updated 4 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,639Jul 10, 2023Updated 2 years ago
- Mimikatz implementation in pure Python☆3,310Apr 9, 2026Updated last month
- Asynchronous Password Spraying Tool in C# for Windows Environments☆318Dec 19, 2023Updated 2 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,341Dec 6, 2023Updated 2 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,664Aug 28, 2025Updated 8 months ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆825May 1, 2026Updated 3 weeks ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Extract credentials from lsass remotely☆2,202Mar 23, 2026Updated last month
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆443Aug 18, 2023Updated 2 years ago
- ☆1,690Apr 14, 2025Updated last year
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,568Oct 17, 2022Updated 3 years ago
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆534Mar 27, 2022Updated 4 years ago
- Self-developed tools for Lateral Movement/Code Execution☆722Aug 17, 2021Updated 4 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆250Jun 19, 2024Updated last year
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆817Aug 28, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Identify the attack paths in BloodHound breaking your AD tiering☆327Nov 6, 2022Updated 3 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆638Aug 15, 2025Updated 9 months ago
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,617Jan 23, 2024Updated 2 years ago
- scan for NTLM directories☆390Aug 13, 2025Updated 9 months ago
- Search tool to find specific files containing specific words, i.e. files containing passwords..☆754Apr 23, 2026Updated last month
- Windows active user credential phishing tool☆284Mar 10, 2020Updated 6 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆297May 2, 2024Updated 2 years ago
- Python3 tool to perform password spraying using RDP☆674Aug 17, 2023Updated 2 years ago
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆424Jul 27, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,236Aug 7, 2025Updated 9 months ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,823Feb 27, 2026Updated 2 months ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Jul 29, 2021Updated 4 years ago
- Loads any C# binary in mem, patching AMSI + ETW.☆849Oct 3, 2021Updated 4 years ago
- Payload Generation Framework☆1,981Aug 21, 2024Updated last year
- Ps-Tools, an advanced process monitoring toolkit for offensive operations☆354Dec 1, 2020Updated 5 years ago
- ☆198Mar 19, 2020Updated 6 years ago