ACK-J / MailFail
MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdomain. The extensions UI popup highlights any misconfigurations in red and links to the supporting documentation.
☆26Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for MailFail
- ☆77Updated 7 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- Living Off Security Tools☆41Updated 3 weeks ago
- Network penetration testing toolset wrapper☆80Updated 2 years ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆103Updated 2 months ago
- Next generation fireprox AWS API endpoint creation utility.☆45Updated last year
- Fast multithreaded multiplatform password spraying tool designed for easy use. Supports webhooks, jitter, delay, files, rotation, backend…☆36Updated 2 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆90Updated last week
- ☆53Updated last year
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆12Updated 2 months ago
- Various AD tools needed for penetration testing in one place.☆21Updated last year
- tool for identifying guest relationships between companies☆84Updated 4 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆133Updated last month
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆69Updated last month
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆95Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 4 months ago
- Tools used for Pentesting☆22Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆98Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆47Updated last month
- Assess Windows OS for security misconfigurations and hardening opportunities.☆31Updated 4 months ago
- ☆29Updated last year
- ☆30Updated 3 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 4 months ago
- Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).☆109Updated 9 months ago
- C2 Automation using Linode☆78Updated 2 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆35Updated 7 months ago
- Ping-based Information Lookup and Outbound Transfer☆75Updated 7 months ago
- Automates the network enumeration process in a fire-and-forget manner, among many more functions. Aims to be the illest Nmap/masscan wrap…☆45Updated 2 weeks ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 2 years ago