DotNetRussell / Alohomora
Alohomora was written as a POC and presented at both DefCon and Derby Con. The application marries data pulled from the Ohio Voter Registration database and data scraped from facebook. The net result is an application that allows you to build highly accurate target profiles on employees of critical infrastructure (or any company really)
☆44Updated 6 years ago
Alternatives and similar repositories for Alohomora:
Users that are interested in Alohomora are comparing it to the libraries listed below
- Web Sight Docker Deployment☆124Updated 7 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆6Updated 5 years ago
- ☆150Updated last year
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Updated 9 years ago
- Get your APT on using social media as a tool for data exfiltration.☆145Updated 2 years ago
- penetration testing scripts☆137Updated 5 years ago
- Duct Tape Command and Control!☆94Updated 5 years ago
- Rogue AP killer☆89Updated 7 years ago
- Your last stop for password list generation needs!☆27Updated 9 years ago
- Stargate☆94Updated 8 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆44Updated 5 years ago
- ☆12Updated 8 years ago
- ☆206Updated 6 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆49Updated 8 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 5 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Script for turning a Raspberry Pi into a Honey Pot Pi☆33Updated 4 months ago
- myBFF - a Brute Force Framework☆139Updated last year
- Transparent network tap☆116Updated 9 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- ☆92Updated 6 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou …☆78Updated 7 months ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- Bash Bunny fun!☆52Updated 6 years ago
- ☆32Updated 10 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆97Updated 7 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆115Updated 6 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆140Updated 9 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆157Updated 9 years ago