Marantral / aMALgamousLinks
Shell and Pen-testing Tool
β15Updated 4 months ago
Alternatives and similar repositories for aMALgamous
Users that are interested in aMALgamous are comparing it to the libraries listed below
Sorting:
- Fully-featured spear-phishing toolkit - web front-endβ52Updated 8 months ago
- Universal Radio Hacker: investigate wireless protocols like a boss π‘πβ17Updated 5 years ago
- β33Updated 7 months ago
- Wireless Pentesting Deviceβ24Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is uβ¦β31Updated 4 years ago
- Red Team Tool Kitβ16Updated 6 years ago
- Sp00fer blog post -β25Updated 3 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.β10Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.β99Updated 5 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's APIβ31Updated 3 years ago
- Active Directory information dumper via LDAPβ13Updated 5 years ago
- A PowerShell Module Dedicated to Reverse Engineeringβ15Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sysβ¦β12Updated 8 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.β12Updated 6 years ago
- Collaborative web dashboard for RedTeam pentestersβ21Updated 5 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.β19Updated 6 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serveβ¦β36Updated 3 years ago
- β28Updated last year
- Script is a proof of concept how to control your machine by using social media sites.β22Updated 7 years ago
- Miscellaneous for various thingsβ21Updated 10 months ago
- Veil 3.1.X (Check version info in Veil at runtime)β15Updated 6 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.β34Updated last year
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan β¦β53Updated 4 years ago
- A Darktrace CLI written in Pythonβ16Updated 5 years ago
- Find open databases - Powered by Binaryedge.ioβ14Updated 5 years ago
- β53Updated 4 years ago
- A utility for password spraying using kerberos from an untrusted/non-domain joined Kali linux host. Useful for user and KDC/DC enumeratioβ¦β19Updated last year
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.β59Updated 4 years ago
- Rogue Access Point Detectorβ37Updated last year
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.β32Updated 5 years ago