Marantral / aMALgamousLinks
Shell and Pen-testing Tool
☆17Updated 5 months ago
Alternatives and similar repositories for aMALgamous
Users that are interested in aMALgamous are comparing it to the libraries listed below
Sorting:
- Sp00fer blog post -☆25Updated 3 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Updated 5 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 6 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Fully-featured spear-phishing toolkit - web front-end☆52Updated 10 months ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- ☆33Updated 9 months ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Wireless Pentesting Device☆24Updated 5 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated last year
- Collaborative web dashboard for RedTeam pentesters☆21Updated 6 years ago
- Post-exploitation NTLM password hash extractor☆20Updated 4 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Updated 5 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Updated 6 years ago
- Automated 802.1x Bypass☆85Updated 5 years ago
- My Python Cookiecutter project template☆32Updated 3 years ago
- A utility for password spraying using kerberos from an untrusted/non-domain joined Kali linux host. Useful for user and KDC/DC enumeratio…☆19Updated 2 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- ☆53Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- Repository of tools used in my blog☆52Updated last year
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 5 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 7 years ago