DotNetRussell / AlohomoraLinks
Alohomora was written as a POC and presented at both DefCon and Derby Con. The application marries data pulled from the Ohio Voter Registration database and data scraped from facebook. The net result is an application that allows you to build highly accurate target profiles on employees of critical infrastructure (or any company really)
☆44Updated 7 years ago
Alternatives and similar repositories for Alohomora
Users that are interested in Alohomora are comparing it to the libraries listed below
Sorting:
- Web Sight Docker Deployment☆122Updated 8 years ago
- Duct Tape Command and Control!☆96Updated 5 months ago
- ☆208Updated 7 years ago
- Stargate☆96Updated 9 years ago
- This is the Command & Control component of the PlugBot project☆102Updated 3 years ago
- Transparent network tap☆120Updated 10 years ago
- Wiegotcha: Long Range RFID Thief☆236Updated 4 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆124Updated 6 years ago
- Get your APT on using social media as a tool for data exfiltration.☆148Updated 3 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 9 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- Various Cheat Sheets related to development and security☆144Updated 5 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆150Updated 10 years ago
- ☆33Updated 11 years ago
- Rogue AP killer☆92Updated 7 years ago
- ☆153Updated 2 years ago
- Your last stop for password list generation needs!☆27Updated 10 years ago
- ☆426Updated 8 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- 'Packet Capture Forensic Evidence eXtractor' is a tool that finds and extracts files from packet capture files☆224Updated 5 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆128Updated 7 years ago
- Because I can't find scripts to do this anywhere else...☆26Updated 9 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- Script for turning a Raspberry Pi into a Honey Pot Pi☆35Updated last year
- Veil Catapult is no longer supported☆75Updated 9 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆61Updated 8 years ago
- For importing, searching, and managing public password breach data☆160Updated 2 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆147Updated 10 years ago