Username lists that I created.
☆17Aug 9, 2021Updated 4 years ago
Alternatives and similar repositories for usernames
Users that are interested in usernames are comparing it to the libraries listed below
Sorting:
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- ☆14Jun 2, 2025Updated 9 months ago
- This script will scrape LinkedIn based on company IDs and will return ALL names associated with the searcht. You can then take these name…☆15Nov 11, 2022Updated 3 years ago
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- Autorev.sh generates reverse shell codes for reverse shell . Supports linux and windows☆17Apr 8, 2022Updated 3 years ago
- DCSync Attack from Outside using Impacket☆115May 2, 2022Updated 3 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Scrape, Hunt, and Transform names and usernames☆128Nov 19, 2022Updated 3 years ago
- This extension allows a user to specify a lockout policy in order to automate a password spray attack via Intruder.☆25Apr 1, 2020Updated 5 years ago
- Rogue Synergy server☆18Mar 8, 2017Updated 8 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Jul 28, 2023Updated 2 years ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆28Aug 8, 2022Updated 3 years ago
- An OSINT employee/username enumeration tool☆68Dec 15, 2025Updated 2 months ago
- ☆28Dec 28, 2017Updated 8 years ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆155Nov 2, 2025Updated 4 months ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆125Apr 9, 2022Updated 3 years ago
- A little cheatsheet for NetExec☆32May 2, 2024Updated last year
- Verification tools for CVE-2016-1287☆33Mar 15, 2017Updated 8 years ago
- Wordpress - Joomla - OpenCart - Drupal CMS Bruter☆11Jul 26, 2022Updated 3 years ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆38Nov 16, 2023Updated 2 years ago
- A small utility to generate a word security report by using a knowledge base(XLSX).☆12Nov 25, 2023Updated 2 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- Scrapes names from LinkedIn companies and creates a list of email addresses from them.☆11Oct 3, 2020Updated 5 years ago
- Examine HTTP response headers for common security issues☆38Jun 7, 2022Updated 3 years ago
- Browser extension that extracts users from LinkedIn company pages☆166Apr 24, 2023Updated 2 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Sep 13, 2024Updated last year
- A framework for stealthy domain reconnaissance☆301Oct 14, 2021Updated 4 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆12Oct 8, 2025Updated 4 months ago
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- Mobile Security - OMTG-Android Walkthrough☆11Oct 31, 2019Updated 6 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆14Feb 25, 2024Updated 2 years ago
- CVE-2017-13156-Janus复现☆12Sep 7, 2020Updated 5 years ago
- Google Workspace password sprayer with anti-captcha☆14Feb 14, 2026Updated 2 weeks ago
- ☆12May 6, 2021Updated 4 years ago
- a patcher for making downgradable iOS 15 firmware☆13Aug 4, 2022Updated 3 years ago
- Curated UTF-8 URL-encoded character dictionary for injection testing, fuzzing, and bypass techniques against web applications and APIs, f…☆13Sep 20, 2021Updated 4 years ago
- A tool that automates the mundane tasks of pentesting Android apps. It uses APKTool and Dex2Jar.☆11May 29, 2020Updated 5 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year