trustedsec / spoonmap
☆150Updated last year
Alternatives and similar repositories for spoonmap:
Users that are interested in spoonmap are comparing it to the libraries listed below
- Lookup for interesting stuff in SMB shares☆149Updated last year
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆143Updated 3 weeks ago
- Protocol agnostic online password guessing API.☆80Updated 2 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆190Updated 3 years ago
- Microsoft External Attack Tool☆178Updated 2 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Updated 8 months ago
- Modular Enumeration and Password Spraying Framework☆116Updated 11 months ago
- ☆186Updated last year
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆216Updated 4 years ago
- Merge multiple nMap xml files into one☆50Updated 5 years ago
- ☆52Updated 6 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆66Updated 3 years ago
- Collection of cyphers for bloodhound☆149Updated 9 months ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆218Updated last year
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆170Updated 3 years ago
- Passive internal reconnaissance tool☆69Updated 2 years ago
- BloodHound Docker Ready to Use☆88Updated last year
- Open-Source Collection of Social Engineering Pretexts☆135Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆228Updated 3 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆152Updated 2 years ago
- NessusV2 File Parser☆66Updated 2 years ago
- Fly into Gophish with One Click (Infra Automation)☆47Updated 2 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆63Updated last year
- Active Directory Lab for Penetration Testing☆50Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆41Updated 3 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆218Updated 2 years ago
- scan for NTLM directories☆353Updated 9 months ago
- Material for the "Hands-On BloodHound" Workshop☆108Updated 3 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago