DotNetRussell / AlohomoraLinks
Alohomora was written as a POC and presented at both DefCon and Derby Con. The application marries data pulled from the Ohio Voter Registration database and data scraped from facebook. The net result is an application that allows you to build highly accurate target profiles on employees of critical infrastructure (or any company really)
☆44Updated 7 years ago
Alternatives and similar repositories for Alohomora
Users that are interested in Alohomora are comparing it to the libraries listed below
Sorting:
- Web Sight Docker Deployment☆122Updated 7 years ago
- Duct Tape Command and Control!☆96Updated 2 months ago
- Stargate☆95Updated 9 years ago
- ☆208Updated 7 years ago
- This is the Command & Control component of the PlugBot project☆102Updated 3 years ago
- Transparent network tap☆119Updated 9 years ago
- Rogue AP killer☆90Updated 7 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆124Updated 6 years ago
- Get your APT on using social media as a tool for data exfiltration.☆147Updated 2 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆43Updated 6 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- For importing, searching, and managing public password breach data☆161Updated last year
- ☆92Updated 7 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- ☆150Updated 2 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆145Updated 10 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- Neet - Network Enumeration and Exploitation Tool☆168Updated 8 years ago
- ☆105Updated 6 years ago
- A script to help set up an event handler in order to install a persistent backdoor that can be activated by sending a message.☆176Updated 5 years ago
- penetration testing scripts☆136Updated 6 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 7 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Updated 6 years ago
- ☆229Updated last year
- Honeypot (Dionaea and kippo) setup script☆84Updated 8 years ago
- A collection of tools for dealing with TrickBot☆202Updated 7 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- A tool to generate graph and other output from NMAP XML files☆117Updated 6 years ago
- ☆427Updated 8 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Updated 10 years ago