zux0x3a / adflyLinks
active directory query tool using LDAP Protocol , helps red teamer / penetration testers to validate users credentials , retrieve information about AD users , AD groups
☆12Updated 5 years ago
Alternatives and similar repositories for adfly
Users that are interested in adfly are comparing it to the libraries listed below
Sorting:
- ☆12Updated 2 years ago
- Some Pentesting Scripts☆11Updated 3 years ago
- Red Team C2 and Post Exploitation Code☆36Updated 2 months ago
- This repository contains some details about abusing outlook.☆27Updated 6 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- ☆17Updated 6 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 4 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆28Updated 5 years ago
- all published scripts devloped by ahmed khlief☆20Updated 5 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated 2 years ago
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆14Updated 7 years ago
- The best way to send emails in Go.☆10Updated 4 years ago
- ☆24Updated 4 years ago
- Silent Cleanup UAC Bypass POC☆11Updated 5 years ago
- ☆16Updated 2 years ago
- module for certexfil☆15Updated 2 years ago
- Apfell implant written in C#.☆8Updated 4 years ago
- post exploitation user monitoring tool☆20Updated 6 years ago
- ☆17Updated 5 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Updated 4 years ago
- ☆12Updated 4 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆16Updated 2 years ago