DotNetRussell / Alohomora
Alohomora was written as a POC and presented at both DefCon and Derby Con. The application marries data pulled from the Ohio Voter Registration database and data scraped from facebook. The net result is an application that allows you to build highly accurate target profiles on employees of critical infrastructure (or any company really)
☆43Updated 7 years ago
Alternatives and similar repositories for Alohomora:
Users that are interested in Alohomora are comparing it to the libraries listed below
- Web Sight Docker Deployment☆124Updated 7 years ago
- Duct Tape Command and Control!☆94Updated 6 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Updated 9 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- An automated SMB relay exploitation script.☆154Updated 8 years ago
- Stargate☆94Updated 8 years ago
- Your last stop for password list generation needs!☆27Updated 10 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated 10 months ago
- Analysis Suite For EAP Enabled Wireless Networks☆123Updated 6 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆44Updated 5 years ago
- Common Findings Database☆100Updated 5 years ago
- A web interface for Hashcat/oclHashcat☆28Updated 8 years ago
- Loot email addresses from commit entries☆56Updated 2 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Transparent network tap☆116Updated 9 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆95Updated 13 years ago
- ☆73Updated 7 years ago
- ☆42Updated 10 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆140Updated 9 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆166Updated 7 years ago
- ☆63Updated 12 years ago
- ☆150Updated last year
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 7 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- ☆51Updated 8 years ago
- ☆53Updated 8 years ago
- tools for analyzing strings from password lists☆58Updated 2 years ago