☆198Jan 18, 2023Updated 3 years ago
Alternatives and similar repositories for golddigger
Users that are interested in golddigger are comparing it to the libraries listed below
Sorting:
- ☆27Aug 18, 2023Updated 2 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated last month
- ☆29May 16, 2023Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- LDAP enumeration tool implemented in Python3☆224May 20, 2025Updated 9 months ago
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- Windows Oracle Database Attack Toolkit☆80Jul 30, 2022Updated 3 years ago
- self-hosted Azure OSINT tool☆33Jun 24, 2025Updated 8 months ago
- A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embed…☆104Dec 8, 2025Updated 2 months ago
- ☆223Oct 22, 2023Updated 2 years ago
- Generate an obfuscated DLL that will disable AMSI & ETW☆330Jul 15, 2024Updated last year
- Fileless Command Execution for Lateral Movement in Nim☆389Dec 12, 2023Updated 2 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Sep 29, 2025Updated 5 months ago
- A sock, with a wire, so you can tunnel all you desire.☆295Jan 19, 2024Updated 2 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆45Aug 9, 2023Updated 2 years ago
- a tool to help operate in EDRs' blind spots☆767Dec 2, 2024Updated last year
- Generate graphs and charts based on password cracking result☆163Feb 17, 2023Updated 3 years ago
- Easy red team phishing with Puppeteer☆132Feb 6, 2023Updated 3 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆738May 19, 2023Updated 2 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆271Sep 14, 2023Updated 2 years ago
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆749Dec 8, 2025Updated 2 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆128Dec 23, 2025Updated 2 months ago
- ☆121Jun 17, 2022Updated 3 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆784Jun 23, 2023Updated 2 years ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆150Jun 5, 2025Updated 8 months ago
- A RunAs clone with the ability to specify the password as an argument.☆112Jul 2, 2023Updated 2 years ago
- Extract C2 Traffic☆253Nov 25, 2024Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- ☆168Feb 29, 2024Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram check☆141Jan 3, 2023Updated 3 years ago
- ☆44Updated this week
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆83Feb 2, 2026Updated last month
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,369Oct 22, 2025Updated 4 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Feb 4, 2025Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆228Updated this week
- Notification webhook for GoPhish☆57Jun 10, 2024Updated last year