trustedsec / spoonmap
☆149Updated last year
Alternatives and similar repositories for spoonmap:
Users that are interested in spoonmap are comparing it to the libraries listed below
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆141Updated 2 weeks ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- ☆186Updated last year
- Protocol agnostic online password guessing API.☆80Updated last year
- Microsoft External Attack Tool☆177Updated 2 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆188Updated 3 years ago
- Modular Enumeration and Password Spraying Framework☆114Updated 9 months ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆187Updated 6 months ago
- Merge multiple nMap xml files into one☆50Updated 5 years ago
- Collection of cyphers for bloodhound☆147Updated 7 months ago
- ☆51Updated 6 years ago
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆81Updated 2 months ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 4 years ago
- scan for NTLM directories☆351Updated 7 months ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆214Updated last year
- This script is a multi-threaded Okta password sprayer.☆70Updated last year
- HoneyCreds network credential injection to detect responder and other network poisoners.☆215Updated 3 years ago
- Active Directory Lab for Penetration Testing☆50Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆220Updated 3 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆69Updated 6 months ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆63Updated 3 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆82Updated 2 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆215Updated 4 years ago
- Simple script to generate commands to achieve reverse shells.☆116Updated 4 years ago
- Fly into Gophish with One Click (Infra Automation)☆46Updated last year
- Office 365 and Exchange Enumeration☆184Updated 5 years ago
- Open-Source Collection of Social Engineering Pretexts☆133Updated last year
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆151Updated last year
- BloodHound Docker Ready to Use☆87Updated last year