☆198Jan 18, 2023Updated 3 years ago
Alternatives and similar repositories for golddigger
Users that are interested in golddigger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆27Aug 18, 2023Updated 2 years ago
- ☆29May 16, 2023Updated 2 years ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- self-hosted Azure OSINT tool☆33Jun 24, 2025Updated 9 months ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated last month
- LDAP enumeration tool implemented in Python3☆225May 20, 2025Updated 10 months ago
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- Windows Oracle Database Attack Toolkit☆80Jul 30, 2022Updated 3 years ago
- A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embed…☆105Dec 8, 2025Updated 3 months ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Sep 30, 2024Updated last year
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆45Aug 9, 2023Updated 2 years ago
- A sock, with a wire, so you can tunnel all you desire.☆297Jan 19, 2024Updated 2 years ago
- Fileless Command Execution for Lateral Movement in Nim☆389Dec 12, 2023Updated 2 years ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆271Sep 14, 2023Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 2 years ago
- ☆224Oct 22, 2023Updated 2 years ago
- Easy red team phishing with Puppeteer☆132Feb 6, 2023Updated 3 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Sep 20, 2024Updated last year
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Updated this week
- Generate graphs and charts based on password cracking result☆163Feb 17, 2023Updated 3 years ago
- Generate an obfuscated DLL that will disable AMSI & ETW☆331Jul 15, 2024Updated last year
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆785Jun 23, 2023Updated 2 years ago
- a tool to help operate in EDRs' blind spots☆769Dec 2, 2024Updated last year
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆83Feb 2, 2026Updated last month
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆740May 19, 2023Updated 2 years ago
- Cloud Penetration Testing Toolkit☆106Jan 7, 2026Updated 2 months ago
- A RunAs clone with the ability to specify the password as an argument.☆112Jul 2, 2023Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram check☆141Jan 3, 2023Updated 3 years ago
- ☆168Feb 29, 2024Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Feb 4, 2025Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆69Aug 22, 2024Updated last year
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- ☆44Updated this week
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆750Dec 8, 2025Updated 3 months ago
- Spartacus DLL/COM Hijacking Toolkit☆1,080Feb 1, 2024Updated 2 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago