DotNetRussell / AlohomoraLinks
Alohomora was written as a POC and presented at both DefCon and Derby Con. The application marries data pulled from the Ohio Voter Registration database and data scraped from facebook. The net result is an application that allows you to build highly accurate target profiles on employees of critical infrastructure (or any company really)
☆44Updated 7 years ago
Alternatives and similar repositories for Alohomora
Users that are interested in Alohomora are comparing it to the libraries listed below
Sorting:
- Web Sight Docker Deployment☆122Updated 7 years ago
- Duct Tape Command and Control!☆96Updated 4 months ago
- Get your APT on using social media as a tool for data exfiltration.☆148Updated 2 years ago
- Stargate☆95Updated 9 years ago
- ☆208Updated 7 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- Rogue AP killer☆92Updated 7 years ago
- Transparent network tap☆120Updated 10 years ago
- ☆152Updated 2 years ago
- This is the Command & Control component of the PlugBot project☆102Updated 3 years ago
- Various Cheat Sheets related to development and security☆143Updated 5 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆126Updated 6 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Updated 9 years ago
- ☆426Updated 8 years ago
- Wiegotcha: Long Range RFID Thief☆237Updated 4 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆260Updated 4 years ago
- ☆92Updated 7 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 9 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆149Updated 10 years ago
- ☆33Updated 11 years ago
- ☆104Updated 6 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆95Updated 13 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆61Updated 8 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Updated 9 years ago
- Common Findings Database☆101Updated 6 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆259Updated 9 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆43Updated 6 years ago
- Veil Catapult is no longer supported☆75Updated 9 years ago