Marantral / aMALgamousLinks
Shell and Pen-testing Tool
β17Updated 5 months ago
Alternatives and similar repositories for aMALgamous
Users that are interested in aMALgamous are comparing it to the libraries listed below
Sorting:
- β33Updated 8 months ago
- Universal Radio Hacker: investigate wireless protocols like a boss π‘πβ17Updated 5 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.β10Updated 4 years ago
- Collaborative web dashboard for RedTeam pentestersβ21Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.β97Updated 5 years ago
- Red Team Tool Kitβ16Updated 6 years ago
- A PowerShell Module Dedicated to Reverse Engineeringβ15Updated 5 years ago
- Fully-featured spear-phishing toolkit - web front-endβ52Updated 9 months ago
- Sp00fer blog post -β25Updated 3 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's APIβ31Updated 3 years ago
- Wireless Pentesting Deviceβ24Updated 5 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serveβ¦β36Updated 3 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is uβ¦β31Updated 4 years ago
- Post-exploitation NTLM password hash extractorβ20Updated 4 years ago
- A utility for password spraying using kerberos from an untrusted/non-domain joined Kali linux host. Useful for user and KDC/DC enumeratioβ¦β19Updated last year
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.β44Updated 6 years ago
- Script is a proof of concept how to control your machine by using social media sites.β22Updated 7 years ago
- Veil 3.1.X (Check version info in Veil at runtime)β16Updated 6 years ago
- Automatically spin up infra for phishingβ64Updated 5 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.β34Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.β12Updated 6 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.β15Updated 8 years ago
- Generates anti-sandbox analysis HTA files without payloadsβ16Updated 8 years ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet datβ¦β38Updated 2 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.β11Updated 5 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).β53Updated 2 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.β59Updated 4 years ago
- Hashes of infamous malwareβ26Updated 2 years ago
- OSINT tool to evaluate the trustworthiness of a companyβ43Updated 5 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap fileβ24Updated 3 years ago