two06 / LinkedIntelLinks
LinkedIn recon the easy way
☆107Updated 3 months ago
Alternatives and similar repositories for LinkedIntel
Users that are interested in LinkedIntel are comparing it to the libraries listed below
Sorting:
- ☆33Updated 2 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆142Updated 2 months ago
- Utilities for obfuscating shellcode☆94Updated 3 weeks ago
- Python utility that generates "imageless" QR codes in various formats☆129Updated last year
- Client-side Encrypted Upload Server Python Script☆64Updated 3 months ago
- Living off the land searches for explorer and sharepoint☆90Updated 5 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆77Updated 10 months ago
- Dump Kerberos tickets☆40Updated 2 months ago
- Permanently disable EDRs as local admin☆116Updated 3 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆131Updated 2 months ago
- IPSpinner works as a local proxy that redirects requests through external services.☆80Updated 6 months ago
- ☆39Updated 7 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆83Updated last month
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆91Updated last year
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆53Updated 7 months ago
- ☆147Updated 5 months ago
- A Python POC for CRED1 over SOCKS5☆158Updated last year
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆56Updated 3 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆88Updated 9 months ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆31Updated last month
- Lifetime AMSI bypass.☆35Updated 5 months ago
- Leak NTLM via Website tab in teams via MS Office☆78Updated last year
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆70Updated last month
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆125Updated last month
- ☆54Updated 4 months ago
- pysnaffler☆104Updated last month
- OAuth Device Code Phishing Toolkit☆89Updated last month
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆34Updated 7 months ago
- Deploy a phishing infrastructure on the fly.☆75Updated 9 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Updated last year