MattKeeley / Spoofy
Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.
☆689Updated 6 months ago
Alternatives and similar repositories for Spoofy:
Users that are interested in Spoofy are comparing it to the libraries listed below
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆327Updated last month
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆630Updated 10 months ago
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆664Updated last week
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆449Updated last year
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,070Updated last month
- Azure JWT Token Manipulation Toolset☆655Updated 4 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆544Updated 5 months ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆408Updated 3 months ago
- Username enumeration and password spraying tool aimed at Microsoft O365.☆845Updated 5 months ago
- ☆481Updated 11 months ago
- Azure Data Exporter for BloodHound☆677Updated last week
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,132Updated 2 weeks ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,030Updated 5 months ago
- ☆679Updated last month
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,081Updated 5 months ago
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆680Updated last week
- BloodHound Attack Research Kit☆533Updated last month
- An open-source self-hosted purple team management web application.☆268Updated 3 weeks ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆243Updated last month
- Compiled tools for internal assessments☆281Updated last week
- ☆239Updated 3 months ago
- Active Directory Auditing and Enumeration☆448Updated 2 weeks ago
- Infrastructure Automation☆345Updated last year
- ☆534Updated last year
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆489Updated 2 years ago
- a tool to help operate in EDRs' blind spots☆728Updated 4 months ago
- A RedTeam Toolkit☆395Updated 3 weeks ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆348Updated 2 years ago
- Pentest Report Generator☆404Updated last week
- Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an…☆390Updated 2 months ago